default search action
Jiejun Kong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2015
- [j11]Jiejun Kong, Tingzhen Li, Dapeng Oliver Wu:
RVIP: an indistinguishable approach to scalable network simulation at real time. Wirel. Commun. Mob. Comput. 15(18): 2219-2232 (2015) - 2010
- [j10]Zhen Cao, Jiejun Kong, Mario Gerla, Zhong Chen, Jian-bin Hu:
Filtering false data via authentic consensus in vehicle ad hoc networks. Int. J. Auton. Adapt. Commun. Syst. 3(2): 217-235 (2010) - 2009
- [j9]Jiejun Kong, Xiaoyan Hong, Dapeng Oliver Wu:
Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes. IEEE Trans. Veh. Technol. 58(5): 2406-2416 (2009) - 2008
- [j8]Yunjung Yi, Jiejun Kong, Mario Gerla, Joon-Sang Park:
CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast. Comput. Commun. 31(15): 3672-3682 (2008) - [j7]Weichao Wang, Jiejun Kong, Bharat K. Bhargava, Mario Gerla:
Visualisation of wormholes in underwater sensor networks: a distributed approach. Int. J. Secur. Networks 3(1): 10-23 (2008) - 2007
- [j6]Uichin Lee, Jiejun Kong, Mario Gerla, Joon-Sang Park, Eugenio Magistretti:
Time-critical underwater sensor diffusion with no proactive exchanges and negligible reactive floods. Ad Hoc Networks 5(6): 943-958 (2007) - [j5]Jiejun Kong, Xiaoyan Hong, Mario Gerla:
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 6(8): 888-902 (2007) - 2006
- [j4]Jun-Hong Cui, Jiejun Kong, Mario Gerla, Shengli Zhou:
The challenges of building mobile underwater wireless networks for aquatic applications. IEEE Netw. 20(3): 12-18 (2006) - [j3]Xiaoyan Hong, Jiejun Kong, Mario Gerla:
Mobility changes anonymity: new passive threats in mobile ad hoc networks. Wirel. Commun. Mob. Comput. 6: 281-293 (2006) - 2004
- [j2]Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, Lixia Zhang:
URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Trans. Netw. 12(6): 1049-1063 (2004) - 2002
- [j1]Jiejun Kong, Haiyun Luo, Kaixin Xu, Daniel Lihui Gu, Mario Gerla, Songwu Lu:
Adaptive security for multilevel ad hoc networks. Wirel. Commun. Mob. Comput. 2(5): 533-547 (2002)
Conference and Workshop Papers
- 2012
- [c20]Tingzhen Li, Jiejun Kong, Ping Li, Peng Gong:
RVIP: bridging live networks and software virtual networks for large scale network simulation at real time. MSWiM 2012: 171-178 - 2008
- [c19]Zhen Cao, Jiejun Kong, Mario Gerla, Dapeng Wu:
A Randomized Complexity-theoretic Model of Bio-inspired Mobile Epidemics via Close Contact. ITSL 2008: 23-28 - 2007
- [c18]Jiejun Kong, Xiaoyan Hong, Dapeng Wu, Mario Gerla:
Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks. BIBE 2007: 914-921 - [c17]Eugenio Magistretti, Jiejun Kong, Uichin Lee, Mario Gerla, Paolo Bellavista, Antonio Corradi:
A Mobile Delay-Tolerant Approach to Long-Term Energy-Efficient Underwater Sensor Networking. WCNC 2007: 2866-2871 - 2006
- [c16]Jiejun Kong, Ling-Jyh Chen, Markus Jakobsson, Stan Moyer, Dave Marples, Mario Gerla:
An Enhanced Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions. ICC 2006: 2351-2356 - [c15]Uichin Lee, Jiejun Kong, Joon-Sang Park, Eugenio Magistretti, Mario Gerla:
Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods. ISCC 2006: 609-615 - [c14]Jiejun Kong, Yeng-Zhong Lee, Mario Gerla:
Distributed multicast group security architecture for mobile ad hoc networks. WCNC 2006: 640-645 - [c13]Jun Liu, Jiejun Kong, Xiaoyan Hong, Mario Gerla:
Performance evaluation of anonymous routing protocols in MANETs. WCNC 2006: 646-651 - [c12]Jiejun Kong, Xiaoyan Hong, Mario Gerla:
Modeling Ad-hoc rushing attack in a negligibility-based security framework. Workshop on Wireless Security 2006: 55-64 - 2005
- [c11]Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, Mario Gerla:
Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing. ISCC 2005: 57-62 - [c10]Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang Park, Jun Liu, Mario Gerla:
A secure ad-hoc routing approach using localized self-healing communities. MobiHoc 2005: 254-265 - [c9]Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla:
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes. SASN 2005: 97-106 - [c8]Jiejun Kong, Zhengrong Ji, Weichao Wang, Mario Gerla, Rajive L. Bagrodia, Bharat K. Bhargava:
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. Workshop on Wireless Security 2005: 87-96 - 2003
- [c7]Jiejun Kong, Mansoor Mirza, James Shu, Christian Yoedhana, Mario Gerla, Songwu Lu:
Random flow network modeling and simulations for DDoS attack mitigation. ICC 2003: 487-491 - [c6]Cindy Xinmin Chen, Jiejun Kong, Carlo Zaniolo:
Design and Implementation of a Temporal Extension of SQL. ICDE 2003: 689-691 - [c5]Jiejun Kong, Xiaoyan Hong:
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. MobiHoc 2003: 291-302 - [c4]Jiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla:
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains. Workshop on Wireless Security 2003: 51-60 - 2002
- [c3]Erik Skow, Jiejun Kong, Thomas Phan, Fred Cheng, Richard G. Guy, Rajive L. Bagrodia, Mario Gerla, Songwu Lu:
A security architecture for application session handoff. ICC 2002: 2058-2063 - [c2]Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu, Lixia Zhang:
Self-securing ad hoc wireless networks. ISCC 2002: 567-574 - 2001
- [c1]Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang:
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. ICNP 2001: 251-260
Reference Works
- 2004
- [r1]Haiyun Luo, Hao Yang, Lixia Zhang, Fan Ye, Jiejun Kong, Songwu Lu, Petros Zerfos:
Ad Hoc Network Security. Mobile Computing Handbook 2004
Informal and Other Publications
- 2011
- [i3]Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla:
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks. IACR Cryptol. ePrint Arch. 2011: 639 (2011) - 2006
- [i2]Jiejun Kong:
GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks. IACR Cryptol. ePrint Arch. 2006: 140 (2006) - 2005
- [i1]Jiejun Kong:
Formal Notions of Anonymity for Peer-to-peer Networks. IACR Cryptol. ePrint Arch. 2005: 132 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint