default search action
Jing Deng 0001
Person information
- affiliation: University of North Carolina at Greensboro, Department of Computer Science, NC, USA
- affiliation (2002 - 2004): Syracuse University, Department of Electrical Engineering and Computer Science, NY, USA
- affiliation (PhD 2002): Cornell University, School of Electrical and Computer EngineeringIthaca, NY, USA
Other persons with the same name
- Jing Deng — disambiguation page
- Jing Deng 0002 — University of Colorado at Boulder, USA
- Jing Deng 0003 — Queen's University Belfast, School of Electronics, Electrical Engineering and Computer Science, UK (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Fahao Chen, Peng Li, Shengli Pan, Lei Zhong, Jing Deng:
Giant Could Be Tiny: Efficient Inference of Giant Models on Resource-Constrained UAVs. IEEE Internet Things J. 11(12): 21170-21179 (2024) - 2023
- [j44]Lin Yao, Jia Li, Jing Deng, Guowei Wu:
Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network. Comput. Secur. 124: 102965 (2023) - [c59]Jing Deng, Po-Ning Chen, Yunghsiang S. Han:
perMAC: Perturbation-based MAC for Dense Wireless Networks with Periodic Traffic. ICNC 2023: 372-376 - [e1]Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann:
Cryptology and Network Security - 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings. Lecture Notes in Computer Science 14342, Springer 2023, ISBN 978-981-99-7562-4 [contents] - 2022
- [j43]Lin Yao, Xiaoying Xu, Jing Deng, Guowei Wu, Zhaoyang Li:
A Cooperative Caching Scheme for VCCN With Mobility Prediction and Consistent Hashing. IEEE Trans. Intell. Transp. Syst. 23(11): 20230-20242 (2022) - [i8]Lei Deng, Danzhou Wu, Jing Deng, Po-Ning Chen, Yunghsiang S. Han:
The Story of 1/e: ALOHA-based and Reinforcement-Learning-based Random Access for Delay-Constrained Communications. CoRR abs/2206.09779 (2022) - 2021
- [j42]Kai Lin, Yihui Li, Jing Deng, Pasquale Pace, Giancarlo Fortino:
Clustering-Learning-Based Long-Term Predictive Localization in 5G-Envisioned Internet of Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(8): 5232-5246 (2021) - [c58]Shravya Muttineni, Jing Deng:
Estimating Sentiment in Social Media - a Case Study of the Migrant Caravans News on Twitter. ICSC 2021: 404-408 - 2020
- [j41]Lin Yao, Zhenzhen Fan, Jing Deng, Xin Fan, Guowei Wu:
Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks. IEEE Trans. Dependable Secur. Comput. 17(6): 1310-1321 (2020) - [c57]Chi Lin, Ziwei Yang, Yu Sun, Jing Deng, Lei Wang, Guowei Wu:
Cooperative Game for Multiple Chargers with Dynamic Network Topology. ICPP 2020: 17:1-17:10 - [c56]Chenghan Jia, Kai Lin, Jing Deng:
A Multi-property Method to Evaluate Trust of Edge Computing Based on Data Driven Capsule Network. INFOCOM Workshops 2020: 616-621 - [i7]Feng Xia, Hannan Bin Liaqat, Jing Deng, Jiafu Wan, Sajal K. Das:
Overhead Control with Reliable Transmission of Popular Packets in Ad-Hoc Social Networks. CoRR abs/2008.05394 (2020)
2010 – 2019
- 2019
- [j40]Xia Zhao, Kexin Zhao, Jing Deng:
Geography Still Matters: Examine the Role of Location in Online Markets for Foreign Branded Products. Decis. Sci. 50(2): 285-310 (2019) - [j39]Mohammad Reza Khalili Shoja, George T. Amariucai, Zhengdao Wang, Shuangqing Wei, Jing Deng:
On the Secret Key Capacity of Sibling Hidden Markov Models. IEEE Trans. Inf. Forensics Secur. 14(2): 514-524 (2019) - [c55]Lin Yao, Binyao Jiang, Jing Deng, Mohammad S. Obaidat:
LSTM-Based Detection for Timing Attacks in Named Data Network. GLOBECOM 2019: 1-6 - [c54]Chi Lin, Yanhong Zhou, Fenglong Ma, Jing Deng, Lei Wang, Guowei Wu:
Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor Networks. INFOCOM 2019: 1819-1827 - [c53]Chi Lin, Chunyang Guo, Wan Du, Jing Deng, Lei Wang, Guowei Wu:
Maximizing Energy Efficiency of Period-Area Coverage with UAVs for Wireless Rechargeable Sensor Networks. SECON 2019: 1-9 - 2018
- [j38]Chi Lin, Kang Wang, Zihao Chu, Kai Wang, Jing Deng, Mohammad S. Obaidat, Guowei Wu:
Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor networks. J. Syst. Softw. 146: 42-58 (2018) - [j37]Lin Yao, Ailun Chen, Jing Deng, Jianbang Wang, Guowei Wu:
A Cooperative Caching Scheme Based on Mobility Prediction in Vehicular Content Centric Networks. IEEE Trans. Veh. Technol. 67(6): 5435-5444 (2018) - [j36]Chi Lin, Shuang Wei, Jing Deng, Mohammad S. Obaidat, Houbing Song, Lei Wang, Guowei Wu:
GTCCS: A Game Theoretical Collaborative Charging Scheduling for On-Demand Charging Architecture. IEEE Trans. Veh. Technol. 67(12): 12124-12136 (2018) - [c52]Lei Deng, Jing Deng, Po-Ning Chen, Yunghsiang S. Han:
On the Asymptotic Performance of Delay-Constrained Slotted ALOHA. ICCCN 2018: 1-8 - [c51]Chi Lin, Chunyang Guo, Jing Deng, Guowei Wu:
3DCS: A 3-D Dynamic Collaborative Scheduling Scheme for Wireless Rechargeable Sensor Networks with Heterogeneous Chargers. ICDCS 2018: 311-320 - [c50]Logan Rohde, Somya D. Mohanty, Jing Deng, Fereidoon Sadri:
The Propagation of Counteracting Information in Online Social Networks: A Case Study. ICDM Workshops 2018: 1173-1177 - [c49]Yanmao Man, Jing Deng, George T. Amariucai, Shuangqing Wei:
HQuad: Statistics of Hamiltonian Cycles in Wireless Rechargeable Sensor Networks. ICT 2018: 549-553 - [c48]Chi Lin, Zhiyuan Wang, Jing Deng, Lei Wang, Jiankang Ren, Guowei Wu:
mTS: Temporal-and Spatial-Collaborative Charging for Wireless Rechargeable Sensor Networks with Multiple Vehicles. INFOCOM 2018: 99-107 - [c47]Chi Lin, Yanhong Zhou, Haipeng Dai, Jing Deng, Guowei Wu:
MPF: Prolonging Network Lifetime of Wireless Rechargeable Sensor Networks by Mixing Partial Charge and Full Charge. SECON 2018: 379-387 - 2017
- [j35]Chi Lin, Ding Han, Jing Deng, Guowei Wu:
P2S: A Primary and Passer-By Scheduling Algorithm for On-Demand Charging Architecture in Wireless Rechargeable Sensor Networks. IEEE Trans. Veh. Technol. 66(9): 8047-8058 (2017) - [c46]Xia Zhao, Kexin Zhao, Jing Deng:
Origin Location Advantages in Online Markets for Foreign Branded Products. AMCIS 2017 - [c45]Mohammad Reza Khalili Shoja, George Traian Amariucai, Zhengdao Wang, Shuangqing Wei, Jing Deng:
Asymptotic converse bound for secret key capacity in hidden Markov model. ISIT 2017: 1968-1972 - [c44]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Successive synthesis of latent Gaussian trees. MILCOM 2017: 315-320 - [i6]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Successive Synthesis of Latent Gaussian Trees. CoRR abs/1701.04873 (2017) - 2016
- [j34]Chi Lin, Guowei Wu, Tie Qiu, Jing Deng:
A low-cost node capture attack algorithm for wireless sensor networks. Int. J. Commun. Syst. 29(7): 1251-1268 (2016) - [j33]Kai Lin, Min Chen, Jing Deng, Mohammad Mehedi Hassan, Giancarlo Fortino:
Enhanced Fingerprinting and Trajectory Prediction for IoT Localization in Smart Buildings. IEEE Trans Autom. Sci. Eng. 13(3): 1294-1307 (2016) - [j32]Mohammad Reza Khalili Shoja, George Traian Amariucai, Shuangqing Wei, Jing Deng:
Secret Common Randomness From Routing Metadata in Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 11(8): 1674-1684 (2016) - [j31]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives. IEEE Trans. Inf. Forensics Secur. 11(10): 2312-2321 (2016) - [j30]Feng Xia, Hannan Bin Liaqat, Jing Deng, Jiafu Wan, Sajal K. Das:
Overhead Control With Reliable Transmission of Popular Packets in Ad-Hoc Social Networks. IEEE Trans. Veh. Technol. 65(9): 7647-7661 (2016) - [j29]Lin Yao, Yanmao Man, Zhong Huang, Jing Deng, Xin Wang:
Secure Routing Based on Social Similarity in Opportunistic Networks. IEEE Trans. Wirel. Commun. 15(1): 594-605 (2016) - [c43]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Synthesis of Gaussian trees with correlation sign ambiguity: An information theoretic approach. Allerton 2016: 378-384 - [c42]Jing Deng, Xiaoli Gao, Chunyue Wang:
Using Bi-level Penalized Logistic Classifier to Detect Zombie Accounts in Online Social Networks. ICNCC 2016: 126-130 - [i5]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Synthesis of Gaussian Trees with Correlation Sign Ambiguity: An Information Theoretic Approach. CoRR abs/1601.06403 (2016) - [i4]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Layered Synthesis of Latent Gaussian Trees. CoRR abs/1608.04484 (2016) - 2015
- [j28]Guowei Wu, Zuosong Liu, Lin Yao, Jing Deng, Jie Wang:
A Trust Routing for Multimedia Social Networks. Comput. J. 58(4): 688-699 (2015) - [j27]Lin Yao, Jing Deng, Jie Wang, Guowei Wu:
A-CACHE: An anchor-based public key caching scheme in large wireless networks. Comput. Networks 87: 78-88 (2015) - [j26]Lin Yao, Lin Kang, Fangyu Deng, Jing Deng, Guowei Wu:
Protecting source-location privacy based on multirings in wireless sensor networks. Concurr. Comput. Pract. Exp. 27(15): 3863-3876 (2015) - [j25]Kexin Zhao, Xia Zhao, Jing Deng:
Online Price Dispersion Revisited: How Do Transaction Prices Differ from Listing Prices? J. Manag. Inf. Syst. 32(1): 261-290 (2015) - [c41]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints. GLOBECOM 2015: 1-6 - [c40]Junjun Ruan, Jing Deng, George T. Amariucai, Shuangqing Wei:
Efficient Link Cuts in Online Social Networks. GLOBECOM 2015: 1-6 - [c39]Chi Lin, Bingbing Xue, Zhiyuan Wang, Ding Han, Jing Deng, Guowei Wu:
DWDP: A Double Warning Thresholds with Double Preemptive Scheduling Scheme for Wireless Rechargeable Sensor Networks. HPCC/CSS/ICESS 2015: 503-508 - [c38]Chi Lin, Kun Liu, Bo Xu, Jing Deng, Chang-Wu Yu, Guowei Wu:
VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs. ICA3PP (3) 2015: 297-310 - [c37]Lixin Fu, Jing Deng:
ROBE - Knitting a Tight Hub for Shortest Path Discovery in Large Social Graphs. ICEIS (1) 2015: 97-107 - [c36]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Evaluation of security robustness against information leakage in Gaussian polytree graphical models. WCNC 2015: 1404-1409 - [i3]Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:
Classifying Unrooted Gaussian Trees under Privacy Constraints. CoRR abs/1504.02530 (2015) - [i2]Mohammad Reza Khalili Shoja, George Traian Amariucai, Shuangqing Wei, Jing Deng:
KERMAN: A Key Establishment Algorithm based on Harvesting Randomness in MANETs. CoRR abs/1504.03744 (2015) - 2014
- [c35]Kevin C. Lee, Jing Deng, Raghuram S. Sudhaakar:
Fast authentication in multi-hop infrastructure-based mobile communication. ICC 2014: 665-670 - [c34]Yang Liu, Mingyan Liu, Jing Deng:
Revisiting optimal power control: Dual effects of SNR and contention. WiOpt 2014: 143-150 - 2013
- [j24]Jing Deng, Yunghsiang S. Han:
Cooperative secret delivery in wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 14(4): 226-237 (2013) - [j23]Yang Liu, Mingyan Liu, Jing Deng:
Evaluating Opportunistic Multi-Channel MAC: Is Diversity Gain Worth the Pain? IEEE J. Sel. Areas Commun. 31(11): 2301-2311 (2013) - [j22]Der-Feng Tseng, Yunghsiang S. Han, Wai Ho Mow, Po-Ning Chen, Jing Deng, A. J. Han Vinck:
Robust Decoding for Convolutionally Coded Systems Impaired by Memoryless Impulsive Noise. IEEE Trans. Commun. 61(11): 4640-4652 (2013) - [c33]Lin Yao, Chi Lin, Jing Deng, Fangyu Deng, Jingwei Miao, Kangbin Yim, Guowei Wu:
Biometrics-based Data Link Layer Anonymous Authentication in VANETs. IMIS 2013: 182-187 - [c32]Lixin Fu, Jing Deng:
Graph Calculus: Scalable Shortest Path Analytics for Large Social Graphs through Core Net. Web Intelligence 2013: 417-424 - [i1]Yang Liu, Mingyan Liu, Jing Deng:
Revisiting Optimal Power Control: its Dual Effect on SNR and Contention. CoRR abs/1309.3716 (2013) - 2012
- [j21]Jing Deng, Scott C.-H. Huang, Yunghsiang S. Han:
An Online Relay Selection Scheme in Power Controllable Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [c31]Panagiotis Papadimitratos, Jing Deng:
Stealthy pre-attacks against random key pre-distribution security. ICC 2012: 955-959 - [c30]Yang Liu, Mingyan Liu, Jing Deng:
Is diversity gain worth the pain: A delay comparison between opportunistic multi-channel MAC and single-channel MAC. INFOCOM 2012: 2921-2925 - 2011
- [j20]Subir Das, Jing Deng, Mario Gerla, Nada Golmie, Jason H. Li, Jiang (Linda) Xie:
Guest Editorial. J. Commun. 6(1): 1-3 (2011) - [c29]Der-Feng Tseng, Yunghsiang S. Han, Wai Ho Mow, Jing Deng:
Efficient decoding over power-line channels. IWSDA 2011: 138-141 - [c28]Kexin Zhao, Xia Zhao, Jing Deng:
Parallel Importation: An Empirical Investigation of Online Unauthorized Distribution Channels for Luxury Fashion Goods. WEB 2011: 216-224 - 2010
- [j19]Hung-Ta Pai, Jing Deng, Yunghsiang S. Han:
Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks. Comput. Commun. 33(13): 1524-1530 (2010) - [c27]Yuan Kong, Jing Deng, Stephen R. Tate:
A Distributed Public Key Caching Scheme in Large Wireless Networks. GLOBECOM 2010: 1-5 - [c26]Jing Deng, Meikang Qiu, Gang Wu:
Fault Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks. NAS 2010: 13-18 - [c25]Xiaocheng Zou, Jing Deng:
Detection of Fabricated CTS Packet Attacks in Wireless LANs. QSHINE 2010: 105-115
2000 – 2009
- 2009
- [j18]Jing Deng:
Multihop/Direct Forwarding (MDF) for static wireless sensor networks. ACM Trans. Sens. Networks 5(4): 35:1-35:25 (2009) - [j17]Jing Deng, Yunghsiang S. Han, Sanjeev R. Kulkarni:
Can multiple subchannels improve the delay performance of RTS/CTS-based MAC schemes? IEEE Trans. Wirel. Commun. 8(4): 1591-1596 (2009) - [c24]Jing Deng, Yunghsiang S. Han, Ben Liang:
Fairness Index Based on Variational Distance. GLOBECOM 2009: 1-6 - [c23]Shan Suthaharan, Abhinav Chawade, Rittwik Jana, Jing Deng:
Energy Efficient DNA-Based Scheduling Scheme for Wireless Sensor Networks. WASA 2009: 459-468 - 2008
- [j16]Jing Deng, Sergei A. Zuyev:
On search sets of expanding ring search in wireless networks. Ad Hoc Networks 6(7): 1168-1181 (2008) - [j15]Jing Deng, Yunghsiang S. Han:
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission. IEEE Trans. Dependable Secur. Comput. 5(3): 177-190 (2008) - [j14]Scott C.-H. Huang, Peng-Jun Wan, Jing Deng, Yunghsiang S. Han:
Broadcast Scheduling in Interference Environment. IEEE Trans. Mob. Comput. 7(11): 1338-1348 (2008) - [c22]Zhiguo Zhang, Jingqi Wu, Jing Deng, Meikang Qiu:
Jamming ACK Attack to Wireless Networks and a Mitigation Approach. GLOBECOM 2008: 4966-4970 - [c21]Meikang Qiu, Jing Deng, Edwin Hsing-Mean Sha:
Failure Rate Minimization with Multiple Function Unit Scheduling for Heterogeneous WSNs. GLOBECOM 2008: 5213-5217 - [c20]Meikang Qiu, Jing Deng:
Key Establishment in Multi-core Parallel Systems. MSN 2008: 122-128 - 2007
- [j13]Jing Deng, Yunghsiang S. Han, Po-Ning Chen, Pramod K. Varshney:
Optimal Transmission Range for Wireless Ad Hoc Networks Based on Energy Efficiency. IEEE Trans. Commun. 55(7): 1439-1439 (2007) - [j12]Jing Deng, Yunghsiang S. Han, Po-Ning Chen, Pramod K. Varshney:
Optimal Transmission Range for Wireless Ad Hoc Networks Based on Energy Efficiency. IEEE Trans. Commun. 55(9): 1772-1782 (2007) - [j11]Kejun Liu, Jing Deng, Pramod K. Varshney, Kashyap Balakrishnan:
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs. IEEE Trans. Mob. Comput. 6(5): 536-550 (2007) - [j10]Dazhi Chen, Jing Deng, Pramod K. Varshney:
Selection of a Forwarding Area for Contention-Based Geographic Forwarding in Wireless Multi-Hop Networks. IEEE Trans. Veh. Technol. 56(5): 3111-3122 (2007) - [c19]Jing Deng, Yunghsiang S. Han:
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks. GLOBECOM 2007: 161-165 - [c18]Zhenghong Wang, Jing Deng, Ruby B. Lee:
Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC. INFOCOM 2007: 2531-2535 - [c17]Cao Liang, Xinming Huang, Jing Deng:
A fault tolerant and energy efficient routing protocol for urban sensor networks. Infoscale 2007: 27 - 2006
- [j9]Sunil Kumar, Vineet S. Raghavan, Jing Deng:
Medium Access Control protocols for ad hoc wireless networks: A survey. Ad Hoc Networks 4(3): 326-358 (2006) - [j8]Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney:
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Trans. Dependable Secur. Comput. 3(1): 62-77 (2006) - [j7]Jing Deng, Yunghsiang S. Han, Zygmunt J. Haas:
Analyzing split channel medium access control schemes. IEEE Trans. Wirel. Commun. 5(5): 967-971 (2006) - [j6]Yunghsiang S. Han, Jing Deng, Zygmunt J. Haas:
Analyzing multi-channel medium access control schemes with ALOHA reservation. IEEE Trans. Wirel. Commun. 5(8): 2143-2152 (2006) - [c16]Jing Deng, Yi Qian:
The Head-of-Line Blocking Problem on Exposed Terminals in MANETs. GLOBECOM 2006 - [c15]Sachin Ganu, Kishore Ramachandran, Marco Gruteser, Ivan Seskar, Jing Deng:
Methods for restoring MAC layer fairness in IEEE 802.11 networks with physical layer capture. REALMAN@MobiHoc 2006: 7-14 - 2005
- [j5]Jing Deng, Yunghsiang S. Han, Wendi Beth Heinzelman, Pramod K. Varshney:
Balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks. Comput. Commun. 28(14): 1631-1642 (2005) - [j4]Jing Deng, Yunghsiang S. Han, Wendi Rabiner Heinzelman, Pramod K. Varshney:
Scheduling Sleeping Nodes in High Density Cluster-based Sensor Networks. Mob. Networks Appl. 10(6): 825-835 (2005) - [j3]Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili:
A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8(2): 228-258 (2005) - [c14]Xiaofei Wang, Jing Deng, Toby Berger:
GB: distributed reachability-tunable broadcast algorithms for wireless sensor networks. MASS 2005: 10 - [c13]Jieying Zhou, Simeng Wang, Jing Deng, Hongda Feng:
ZBMRP: A Zone Based Multicast Routing Protocol for Mobile Ad Hoc Networks. MSN 2005: 113-122 - [c12]Jing Deng, Yunghsiang S. Han:
Using MDS Codes for the Key Establishment of Wireless Sensor Networks. MSN 2005: 732-744 - [c11]Dazhi Chen, Jing Deng, Pramod K. Varshney:
On the forwarding area of contention-based geographic forwarding for ad hoc and sensor networks. SECON 2005: 130-141 - [c10]Dazhi Chen, Jing Deng, Pramod K. Varshney:
A state-free data delivery protocol for multihop wireless sensor networks. WCNC 2005: 1818-1823 - [c9]Kashyap Balakrishnan, Jing Deng, Pramod K. Varshney:
TWOACK: preventing selfishness in mobile ad hoc networks. WCNC 2005: 2137-2142 - 2004
- [c8]Jing Deng, Ben Liang, Pramod K. Varshney:
Tuning the carrier sensing range of IEEE 802.11 MAC. GLOBECOM 2004: 2987-2991 - [c7]Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, Pramod K. Varshney:
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. INFOCOM 2004 - [c6]Jing Deng, Yunghsiang Sam Han, Po-Ning Chen, Pramod K. Varshney:
Optimum transmission range for wireless ad hoc networks. WCNC 2004: 1024-1029 - 2003
- [j2]Zygmunt J. Haas, Jing Deng:
On optimizing the backoff interval for random access schemes. IEEE Trans. Commun. 51(12): 2081-2090 (2003) - [c5]Jing Deng, Yunghsiang S. Han, Zygmunt J. Haas:
Analyzing Split Channel Medium Access Control Schemas with ALOHA Reservation. ADHOC-NOW 2003: 128-139 - [c4]Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney:
A pairwise key pre-distribution scheme for wireless sensor networks. CCS 2003: 42-51 - [c3]Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney:
A witness-based approach for data fusion assurance in wireless sensor networks. GLOBECOM 2003: 1435-1439 - 2002
- [j1]Zygmunt J. Haas, Jing Deng:
Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks. IEEE Trans. Commun. 50(6): 975-985 (2002) - [c2]Marc R. Pearlman, Jing Deng, Ben Liang, Zygmunt J. Haas:
Elective participation in ad hoc networks based on energy consumption. GLOBECOM 2002: 26-31
1990 – 1999
- 1999
- [c1]Zygmunt J. Haas, Jing Deng:
Dual busy tone multiple access (DBTMA)-performance results. WCNC 1999: 1328-1332
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint