default search action
Wenye Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Yazhou Yuan, Shicong Gao, Ziteng Zhang, Wenye Wang, Zhezhuang Xu, Zhixin Liu:
Edge-Cloud Collaborative UAV Object Detection: Edge-Embedded Lightweight Algorithm Design and Task Offloading Using Fuzzy Neural Network. IEEE Trans. Cloud Comput. 12(1): 306-318 (2024) - [j54]Xueliang Zhang, Qi Su, Pengfeng Xiao, Wenye Wang, Zhenshi Li, Guangjun He:
FlipCAM: A Feature-Level Flipping Augmentation Method for Weakly Supervised Building Extraction From High-Resolution Remote Sensing Imagery. IEEE Trans. Geosci. Remote. Sens. 62: 1-17 (2024) - [c112]Mengning Li, Wenye Wang:
Hybrid Zone: Bridging Acoustic and Wi-Fi for Enhanced Gesture Recognition. INFOCOM 2024: 981-990 - [c111]Rui Zou, Wenye Wang:
Effi-Ace: Efficient and Accurate Prediction for High-Resolution Spectrum Tenancy. INFOCOM 2024: 2199-2208 - 2023
- [j53]Teng Fei, Wenye Wang:
The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks. Comput. Networks 228: 109685 (2023) - [j52]Jie Wang, Wenye Wang, Cliff Wang:
Remedy or Resource Drain: Modeling and Analysis of Massive Task Offloading Processes in Fog. IEEE Internet Things J. 10(13): 11669-11682 (2023) - [j51]Rui Zou, Wenye Wang:
Downlink Decoding Based Accurate Measurement of LTE Spectrum Tenancy. IEEE Trans. Mob. Comput. 22(5): 2613-2627 (2023) - [j50]Jie Wang, Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:
Toward Fast and Energy-Efficient Access to Cloudlets in Hostile Environments. IEEE Trans. Wirel. Commun. 22(11): 8320-8335 (2023) - [c110]Ying Liang, Guangjun He, Wenye Wang, Shichao Jin, Pengming Feng, Xueliang Zhang:
Moving Ship Target Detection Method for Geostationary Orbit Satellite Panchromatic Image Sequence. AAIA 2023: 195-200 - [c109]Lichen Fu, Wenye Wang:
Modeling and Analysis of Information Leakage Under Multiple Adversaries. GLOBECOM 2023: 1729-1734 - [c108]Rui Zou, Wenye Wang:
TOP: Total Occupancy Guided Prediction of Binary Spectrum Tenancy. ICC 2023: 4597-4602 - [c107]Xiaozhuang Liu, Zhenxing Niu, Wenye Wang:
Towards Multi-Person Gesture Recognition using Commodity Wi-Fi. ICCCN 2023: 1-10 - 2022
- [j49]Qi Su, Xueliang Zhang, Pengfeng Xiao, Zhenshi Li, Wenye Wang:
Which CAM is Better for Extracting Geographic Objects? A Perspective From Principles and Experiments. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 15: 5623-5635 (2022) - [j48]Wenye Wang, Shenghua Wan, Pengfeng Xiao, Xueliang Zhang:
A Novel Multi-Training Method for Time-Series Urban Green Cover Recognition From Multitemporal Remote Sensing Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 15: 9531-9544 (2022) - [j47]Jie Wang, Wenye Wang, Cliff Wang, Min Song:
Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection. IEEE Trans. Mob. Comput. 21(5): 1829-1846 (2022) - 2021
- [c106]Rui Zou, Wenye Wang, Huaiyu Dai:
Temporal and Spectral Analysis of Spectrum Hole Distributions in an LTE Cell. GLOBECOM 2021: 1-6 - 2020
- [j46]Jie Wang, Wenye Wang, Cliff Wang:
Modeling and Analysis of Conflicting Information Propagation in a Finite Time Horizon. IEEE/ACM Trans. Netw. 28(3): 972-985 (2020) - [c105]Ali Jalooli, Kuilin Zhang, Min Song, Wenye Wang:
A Novel Clustering Scheme for Heterogeneous Vehicular Networks. ICC 2020: 1-6 - [c104]Rui Zou, Wenye Wang:
U-CIMAN: Uncover Spectrum and User Information in LTE Mobile Access Networks. INFOCOM 2020: 1459-1468
2010 – 2019
- 2019
- [j45]Jie Wang, Sigit Aryo Pambudi, Wenye Wang, Min Song:
Resilience of IoT Systems Against Edge-Induced Cascade-of-Failures: A Networking Perspective. IEEE Internet Things J. 6(4): 6952-6963 (2019) - [j44]Ali Jalooli, Min Song, Wenye Wang:
Message coverage maximization in infrastructure-based urban vehicular networks. Veh. Commun. 16: 1-14 (2019) - [c103]Teng Fei, Wenye Wang:
LTE Is Vulnerable: Implementing Identity Spoofing and Denial-of-Service Attacks in LTE Networks. GLOBECOM 2019: 1-6 - [c102]Rui Zou, Wenye Wang:
Change Detection Based Segmentation and Modeling of LTE Spectrum Tenancy. GLOBECOM 2019: 1-6 - [c101]Mingkui Wei, Jie Wang, Zhuo Lu, Wenye Wang:
On Studying Information Dissemination in Social-Physical Interdependent Networks. ICC 2019: 1-6 - [c100]Jie Wang, Wenye Wang, Cliff Wang:
SAS: Modeling and Analysis of Spectrum Activity Surveillance in Wireless Overlay Networks. INFOCOM 2019: 2143-2151 - 2018
- [j43]Mingkui Wei, Zhuo Lu, Wenye Wang:
On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid. IEEE Syst. J. 12(4): 3404-3413 (2018) - [c99]Rui Zou, Wenye Wang:
A Flow Rule Timeout Assignment Algorithm for SDN-Assisted Network MIMO Systems. ICC 2018: 1-6 - [c98]Sigit Aryo Pambudi, Jie Wang, Wenye Wang, Min Song, Xiaoyan Zhu:
The Aftermath of Broken Links: Resilience of IoT Systems from a Networking Perspective. ICCCN 2018: 1-9 - [c97]Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:
Fast Rendezvous for Spectrum-Agile IoT Devices with Limited Channel Hopping Capability. INFOCOM 2018: 1385-1393 - 2017
- [c96]Seyyedali Hosseinalipour, Jie Wang, Huaiyu Dai, Wenye Wang:
Detection of Infections Using Graph Signal Processing in Heterogeneous Networks. GLOBECOM 2017: 1-6 - [c95]Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:
From Isolation Time to Node Resilience: Impact of Cascades in D2D-Based Social Networks. GLOBECOM 2017: 1-6 - [c94]Yali Wang, Wenye Wang, Mei Song:
How Durable and Stable Is a File Sharing on the Move in Cellular-Assisted D2D Communications? GLOBECOM 2017: 1-6 - [c93]Jie Wang, Wenye Wang, Cliff Wang:
Modeling and Strategy Design for Spectrum Monitoring over a Geographical Region. GLOBECOM 2017: 1-6 - [c92]Mingkui Wei, Zhuo Lu, Wenye Wang:
On modeling and understanding vehicle evacuation attacks in VANETs. ICC 2017: 1-7 - [c91]Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:
On the Root Cause of Dropout-Induced Contraction Process in D2D-Based Mobile Social Networks. ICCCN 2017: 1-9 - 2016
- [j42]Mingkui Wei, Wenye Wang:
Data-centric threats and their impacts to real-time communications in smart grid. Comput. Networks 104: 174-188 (2016) - [j41]Lei Sun, Wenye Wang, Yujin Li:
The Impact of Network Size and Mobility on Information Delivery in Cognitive Radio Networks. IEEE Trans. Mob. Comput. 15(1): 217-231 (2016) - [j40]Zhuo Lu, Wenye Wang, Cliff Wang:
On the Evolution and Impact of Mobile Botnets in Wireless Networks. IEEE Trans. Mob. Comput. 15(9): 2304-2316 (2016) - [c90]Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:
How Robust Is a D2D-Based Messaging Service? GLOBECOM 2016: 1-6 - [c89]Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:
On the Resilience of D2D-Based Social Networking Service against Random Failures. GLOBECOM 2016: 1-6 - [c88]Yali Wang, Yujin Li, Wenye Wang, Mei Song:
A Locality-Based Mobile Caching Policy for D2D-Based Content Sharing Network. GLOBECOM 2016: 1-6 - [c87]Jie Wang, Wenye Wang, Cliff Wang:
Divide and Conquer: Leveraging Topology in Control of Epidemic Information Dynamics. GLOBECOM 2016: 1-6 - [c86]Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:
Modeling and estimating the structure of D2D-based mobile social networks. ICC 2016: 1-6 - [c85]Jie Wang, Wenye Wang, Cliff Wang:
How the anti-rumor kills the rumor: Conflicting information propagation in networks. ICC 2016: 1-6 - [c84]Mingkui Wei, Zhuo Lu, Wenye Wang:
Dominoes with communications: On characterizing the progress of cascading failures in Smart Grid. ICC 2016: 1-6 - [c83]Jie Wang, Wenye Wang:
To live or to die: Encountering conflict information dissemination over simple networks. INFOCOM 2016: 1-9 - 2015
- [b1]Zhuo Lu, Wenye Wang, Cliff Wang:
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-23287-4, pp. 1-116 - [j39]Zhuo Lu, Wenye Wang, Cliff Wang:
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming. IEEE Trans. Dependable Secur. Comput. 12(1): 31-44 (2015) - [j38]Lei Sun, Wenye Wang, Zhuo Lu:
On Topology and Resilience of Large-Scale Cognitive Radio Networks Under Generic Failures. IEEE Trans. Wirel. Commun. 14(6): 3390-3401 (2015) - [c82]Mingkui Wei, Xi Gong, Wenye Wang:
Claim What You Need: A Text-Mining Approach on Android Permission Request Authorization. GLOBECOM 2015: 1-6 - [c81]Mingkui Wei, Wenye Wang:
Safety Can Be Dangerous: Secure Communications Impair Smart Grid Stability under Emergencies. GLOBECOM 2015: 1-6 - [c80]Xiaoyan Zhu, Zengbao Chen, Wenye Wang:
G2G: Privacy-preserving group matching for proximity-based mobile social networks. ICCC 2015: 1-6 - 2014
- [j37]Xu Li, Xiaodong Lin, Wenye Wang, Nathalie Mitton:
PPNA special issue on "the green, reliability and security of machine-to-machine communications". Peer-to-Peer Netw. Appl. 7(3): 213-214 (2014) - [j36]Zhuo Lu, Wenye Wang, Cliff Wang:
Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications. IEEE Trans. Mob. Comput. 13(8): 1746-1759 (2014) - [j35]Yujin Li, Wenye Wang:
Message Dissemination in Intermittently Connected D2D Communication Networks. IEEE Trans. Wirel. Commun. 13(7): 3978-3990 (2014) - [c79]Yujin Li, Lei Sun, Wenye Wang:
Exploring device-to-device communication for mobile cloud computing. ICC 2014: 2239-2244 - [c78]Sigit Aryo Pambudi, Wenye Wang:
Boundary matters: Impact of finite boundary to packet delay performance in mobile data networks. ICC 2014: 2748-2753 - [c77]Yujin Li, Wenye Wang:
Can mobile cloudlets support mobile applications? INFOCOM 2014: 1060-1068 - [c76]Zhuo Lu, Wenye Wang, Cliff Wang:
How can botnets cause storms? Understanding the evolution and impact of mobile botnets. INFOCOM 2014: 1501-1509 - [c75]Mingkui Wei, Wenye Wang:
Greenbench: A benchmark for observing power grid vulnerability under data-centric threats. INFOCOM 2014: 2625-2633 - 2013
- [j34]Wenye Wang, Zhuo Lu:
Cyber security in the Smart Grid: Survey and challenges. Comput. Networks 57(5): 1344-1371 (2013) - [j33]Yi Xu, Wenye Wang:
Scheduling Partition for Order Optimal Capacity in Large-Scale Wireless Networks. IEEE Trans. Mob. Comput. 12(4): 666-679 (2013) - [j32]Xiang Lu, Wenye Wang, Jianfeng Ma:
An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation. IEEE Trans. Smart Grid 4(1): 170-183 (2013) - [j31]Yujin Li, Ming Zhao, Wenye Wang:
Internode Mobility Correlation for Group Detection and Analysis in VANETs. IEEE Trans. Veh. Technol. 62(9): 4590-4601 (2013) - [j30]Yi Xu, Wenye Wang:
Wireless Mesh Network in Smart Grid: Modeling and Analysis for Time Critical Communications. IEEE Trans. Wirel. Commun. 12(7): 3360-3371 (2013) - [c74]Lei Sun, Wenye Wang:
Understanding topology dynamics in large-scale Cognitive Radio Networks under generic failures. GLOBECOM 2013: 1161-1166 - [c73]Mingkui Wei, Wenye Wang:
Toward distributed intelligent: A case study of peer to peer communication in smart grid. GLOBECOM 2013: 2210-2216 - [c72]Lei Sun, Wenye Wang:
Understanding Blackholes in large-scale Cognitive Radio Networks under generic failures. INFOCOM 2013: 728-736 - [c71]Yujin Li, Wenye Wang:
Horizon on the move: Geocast in intermittently connected vehicular ad hoc networks. INFOCOM 2013: 2553-2561 - [c70]Xiang Lu, Wenye Wang, Jianfeng Ma, Limin Sun:
Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture. SmartGridComm 2013: 612-617 - 2012
- [j29]Xiang Lu, Wenye Wang, Jianfeng Ma:
Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems. Int. J. Distributed Sens. Networks 8 (2012) - [j28]Ming Zhao, Yujin Li, Wenye Wang:
Modeling and Analytical Study of Link Properties in Multihop Wireless Networks. IEEE Trans. Commun. 60(2): 445-455 (2012) - [j27]Zhuo Lu, Wenye Wang, Cliff Wang:
Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks. IEEE Trans. Mob. Comput. 11(8): 1331-1344 (2012) - [c69]Yujin Li, Wenye Wang, Alexandra Duel-Hallen:
The latency of gaining α-reliability for message dissemination in vehicle-to-vehicle networks. GLOBECOM 2012: 5550-5555 - [c68]Yujin Li, Wenye Wang:
Geo-dissemination in vehicular ad hoc networks. ICC 2012: 302-306 - [c67]Lei Sun, Wenye Wang:
On the connectivity of large multi-channel cognitive radio networks. ICC 2012: 1854-1858 - [c66]Neil Mehta, Alexandra Duel-Hallen, Wenye Wang:
Enabling adaptive rate and relay selection for 802.11 mobile ad hoc networks. ICC 2012: 4150-4154 - [c65]Lei Sun, Wenye Wang:
Understanding the tempo-spatial limits of information dissemination in multi-channel Cognitive Radio Networks. INFOCOM 2012: 1278-1286 - [c64]Lei Sun, Wenye Wang:
On latency distribution and scaling: from finite to large Cognitive Radio Networks under general mobility. INFOCOM 2012: 1287-1295 - [c63]Zhuo Lu, Wenye Wang, Cliff Wang:
Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming. INFOCOM 2012: 3066-3070 - [c62]Jianhua Zhang, Wenye Wang, Subhashish Bhattacharya:
Architecture of solid state transformer-based energy router and models of energy traffic. ISGT 2012: 1-8 - [c61]Fei Wang, Xiang Lu, Wenye Wang, Alex Q. Huang:
Development of distributed grid intelligence platform for solid state transformer. SmartGridComm 2012: 481-485 - 2011
- [j26]Fei Xing, Wenye Wang:
Toward robust multi-hop data forwarding in large scale wireless networks. Comput. Networks 55(11): 2608-2621 (2011) - [j25]Wenye Wang, Yi Xu, Mohit Khanna:
A survey on the communication architectures in smart grid. Comput. Networks 55(15): 3604-3629 (2011) - [j24]Yi Xu, Wenye Wang:
The limit of information propagation speed in large-scale multihop wireless networks. IEEE/ACM Trans. Netw. 19(1): 209-222 (2011) - [c60]Yujin Li, Ming Zhao, Wenye Wang:
Intermittently Connected Vehicle-to-Vehicle Networks: Detection and Analysis. GLOBECOM 2011: 1-6 - [c59]Xiang Lu, Zhuo Lu, Wenye Wang, Jianfeng Ma:
On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP. GLOBECOM 2011: 1-6 - [c58]Haiyang Zheng, Wenye Wang:
On the Access Time in Mobile Hybrid Networks. GLOBECOM 2011: 1-5 - [c57]Lei Sun, Wenye Wang:
On the Dissemination Latency of Cognitive Radio Networks under General Node Mobility. ICC 2011: 1-5 - [c56]Fei Xing, Wenye Wang:
On the User-Centric Connection Availability of Mobile Wireless Networks. ICC 2011: 1-6 - [c55]Yi Xu, Wenye Wang:
The Speed Bounds on Event Reporting in Mobile Sensor Networks with Energy Constraints. ICC 2011: 1-5 - [c54]Lei Sun, Wenye Wang:
On distribution and limits of information dissemination latency and speed in mobile cognitive radio networks. INFOCOM 2011: 246-250 - [c53]Yi Xu, Wenye Wang:
Information delivery in large wireless networks with minimum energy expense. INFOCOM 2011: 1584-1592 - [c52]Zhuo Lu, Wenye Wang, Cliff Wang:
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic. INFOCOM 2011: 1871-1879 - [c51]Xiang Lu, Wenye Wang, Zhuo Lu, Jianfeng Ma:
From security to vulnerability: Data authentication undermines message delivery in smart grid. MILCOM 2011: 1183-1188 - [c50]Yi Xu, Jianhua Zhang, Wenye Wang, Avik Juneja, Subhashish Bhattacharya:
Energy router: Architectures and functionalities toward Energy Internet. SmartGridComm 2011: 31-36 - [c49]Xiang Lu, Wenye Wang, Avik Juneja, Alexander Dean:
Talk to transformers: An empirical study of device communications for the FREEDM system. SmartGridComm 2011: 303-308 - [i1]Neil Mehta, Alexandra Duel-Hallen, Wenye Wang:
Enabling Adaptive Rate and Relay Selection for 802.11 Mobile Ad Hoc Networks. CoRR abs/1109.4306 (2011) - 2010
- [j23]Avesh Kumar Agarwal, Wenye Wang:
An Experimental Study of the Performance Impact of Path-Based DoS Attacks in Wireless Mesh Networks. Mob. Networks Appl. 15(5): 693-709 (2010) - [j22]Fei Xing, Wenye Wang:
On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures. IEEE Trans. Dependable Secur. Comput. 7(3): 284-299 (2010) - [c48]Lei Sun, Wenye Wang:
Topology-Incurred Delay for Information Dissemination in Large Multi-Channel Cognitive Radio Networks. GLOBECOM 2010: 1-5 - [c47]S. Kharbash, Wenye Wang:
All-Terminal Network Reliability Optimization in Fading Environment via Cross Entropy Method. ICC 2010: 1-5 - [c46]Zhuo Lu, Cliff Wang, Wenye Wang:
On the Impact of Backoff Misbehaving Nodes in IEEE 802.11 Networks. ICC 2010: 1-5 - [c45]Yi Xu, Wenye Wang:
Phase Transition of Traffic Overloading Failures in Large Wireless Networks. ICC 2010: 1-5 - [c44]Chi Yi, Wenye Wang:
On the Connectivity of Large-Scale Hybrid Wireless Networks. ICC 2010: 1-5 - [c43]Zhuo Lu, Wenye Wang, Cliff Wang:
On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks. INFOCOM 2010: 1819-1827 - [c42]Yi Xu, Wenye Wang:
Characterizing the Spread of Correlated Failures in Large Wireless Networks. INFOCOM 2010: 1882-1890 - [c41]Chi Yi, Wenye Wang:
On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks. INFOCOM 2010: 2748-2756
2000 – 2009
- 2009
- [j21]Wenye Wang, Michael Devetsikiotis:
Editorial. Mob. Networks Appl. 14(4): 365-367 (2009) - [j20]Yi Xu, Wenye Wang:
Topology Stability Analysis and Its Application in Hierarchical Mobile Ad Hoc Networks. IEEE Trans. Veh. Technol. 58(3): 1546-1560 (2009) - [j19]Ming Zhao, Wenye Wang:
A unified mobility model for analysis and simulation of mobile wireless networks. Wirel. Networks 15(3): 365-389 (2009) - [c40]Avesh Kumar Agarwal, Wenye Wang:
Performance Sensitivities of Wireless Mesh Networks Under Path-Based DoS Attacks. GLOBECOM 2009: 1-6 - [c39]Lei Sun, Wenye Wang:
On Study of Achievable Capacity with Hybrid Relay in Cognitive Radio Networks. GLOBECOM 2009: 1-6 - [c38]Yi Xu, Wenye Wang:
Localized Scheduling for Practical and Optimal Capacity Utilization in Large Wireless Networks. GLOBECOM 2009: 1-6 - [c37]Yi Xu, Wenye Wang:
Scheduling partition for order optimal capacity in large-scale wireless networks. MobiCom 2009: 109-120 - 2008
- [j18]Nurcan Tezcan, Wenye Wang:
Self-orienting wireless multimedia sensor networks for occlusion-free viewpoints. Comput. Networks 52(13): 2558-2567 (2008) - [c36]Nurcan Tezcan, Wenye Wang:
Self-Orienting Wireless Multimedia Sensor Networks for Maximizing Multimedia Coverage. ICC 2008: 2206-2210 - [c35]Fei Xing, Wenye Wang:
On the Devolution of Large-Scale Sensor Networks in the Presence of Random Failures. ICC 2008: 2304-2308 - [c34]Yi Xu, Wenye Wang:
Finding the Fastest Path in Wireless Networks. ICC 2008: 3188-3192 - [c33]Yi Xu, Wenye Wang:
The Speed of Information Propagation in Large Wireless Networks. INFOCOM 2008: 16-20 - [c32]Wenye Wang, Ming Zhao:
Joint Effects of Radio Channels and Node Mobility on Link Dynamics in Wireless Networks. INFOCOM 2008: 933-941 - [c31]Fei Xing, Wenye Wang:
On the critical phase transition time of wireless multi-hop networks with random failures. MobiCom 2008: 175-186 - 2007
- [j17]Nurcan Tezcan, Wenye Wang:
ART: an asymmetric and reliable transport mechanism for wireless sensor networks. Int. J. Sens. Networks 2(3/4): 188-200 (2007) - [j16]Avesh Kumar Agarwal, Wenye Wang:
On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility. Mob. Networks Appl. 12(1): 93-110 (2007) - [j15]Xinbing Wang, Do Young Eun, Wenye Wang:
A Dynamic TCP-Aware Call Admission Control Scheme for Generic Next Generation Packet-Switched Wireless Networks. IEEE Trans. Wirel. Commun. 6(9): 3344-3352 (2007) - [c30]Sherry Wang, Harold Zheng, Wenye Wang:
Efficient Security Management for Ad Hoc Networks. GLOBECOM 2007: 469-473 - [c29]Ming Zhao, Wenye Wang:
The Impacts of Radio Channels and Node Mobility on Link Statistics in Mobile Ad Hoc Networks. GLOBECOM 2007: 1206-1210 - [c28]Yi Xu, Wenye Wang:
Stability of Hierarchical Mobile Ad Hoc Networks. GLOBECOM 2007: 1232-1236 - [c27]Fei Xing, Wenye Wang:
On the Expected Connection Lifetime and Stochastic Resilience of Wireless Multi-Hop Networks. GLOBECOM 2007: 1263-1267 - [c26]Fei Xing, Wenye Wang:
On the Resilient Overlay Topology Formation in Multi-hop Wireless Networks. Networking 2007: 1-12 - [c25]S. Kharbash, Wenye Wang:
Computing Two-Terminal Reliability in Mobile Ad Hoc Networks. WCNC 2007: 2831-2836 - [c24]Nurcan Tezcan, Wenye Wang:
Distributed Coordination of Sensors for End-to-End Reliable Event and Query Delivery. WCNC 2007: 2986-2991 - [c23]Ming Zhao, Wenye Wang:
Analyzing Topology Dynamics in Ad Hoc Networks Using A Smooth Mobility Model. WCNC 2007: 3279-3284 - [c22]Nurcan Tezcan, Wenye Wang:
Effective Coverage and Connectivity Preserving in Wireless Sensor Networks. WCNC 2007: 3388-3393 - [c21]Fei Xing, Wenye Wang:
Analyzing Resilience to Node Misbehaviors in Wireless Multi-Hop Networks. WCNC 2007: 3489-3494 - 2006
- [j14]Wenye Wang, Guoliang Xue:
A cost-minimization algorithm for fast location tracking in mobile wireless networks. Comput. Networks 50(15): 2713-2726 (2006) - [j13]Nurcan Tezcan, Wenye Wang:
TTS: a two-tiered scheduling mechanism for energy conservation in wireless sensor networks. Int. J. Sens. Networks 1(3/4): 213-228 (2006) - [j12]Wenye Wang, Xinbing Wang, Arne A. Nilsson:
Energy-efficient bandwidth allocation in wireless networks: algorithms, analysis, and simulations. IEEE Trans. Wirel. Commun. 5(5): 1103-1114 (2006) - [j11]Jung Kee Song, Wenye Wang:
A simulation study of IP-based vertical handoff in wireless convergent networks. Wirel. Commun. Mob. Comput. 6: 629-650 (2006) - [c20]Ming Zhao, Wenye Wang:
A Novel Semi-Markov Smooth Mobility Model for Mobile Ad Hoc Networks. GLOBECOM 2006 - [c19]Fei Xing, Wenye Wang:
Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes. ICC 2006: 1879-1884 - [c18]Nurcan Tezcan, Wenye Wang:
TTS: A Two-Tiered Scheduling Algorithm for Effective Energy Conservation in Wireless Sensor Networks. ICC 2006: 3359-3364 - [c17]Xinbing Wang, Do Young Eun, Wenye Wang:
A TCP-aware call admission control scheme for packet-switched wireless networks. IPCCC 2006 - 2005
- [j10]Wei Liang, Wenye Wang:
On performance analysis of challenge/response based authentication in wireless networks. Comput. Networks 48(2): 267-288 (2005) - [j9]Janise McNair, Tuna Tugcu, Wenye Wang, Jiang (Linda) Xie:
A survey of cross-layer performance enhancements for Mobile IP networks. Comput. Networks 49(2): 119-146 (2005) - [j8]Wenye Wang, Wei Liang, Avesh Kumar Agarwal:
Integration of authentication and mobility management in third generation and WLAN data networks. Wirel. Commun. Mob. Comput. 5: 665-678 (2005) - [c16]Avesh Kumar Agarwal, Wenye Wang:
Measuring performance impact of security protocols in wireless local area networks. BROADNETS 2005: 625-634 - [c15]Avesh Kumar Agarwal, Wenye Wang, Janise McNair:
An experimental study of cross-layer security protocols in public access wireless networks. GLOBECOM 2005: 5 - [c14]Nurcan Tezcan, Wenye Wang:
A lightweight classification algorithm for energy conservation in wireless sensor networks. ICCCN 2005: 87-92 - [c13]Avesh Kumar Agarwal, Wenye Wang:
Statistical analysis of the impact of routing in MANETs based on real-time measurements. ICCCN 2005: 443-448 - [c12]Wenye Wang, Xinbing Wang, Arne A. Nilsson:
A new admission control scheme under energy and QoS constraints for wireless networks. INFOCOM 2005: 1283-1294 - [c11]Wei Liang, Wenye Wang:
A quantitative study of authentication and QoS in wireless IP networks. INFOCOM 2005: 1478-1489 - 2004
- [j7]Ian F. Akyildiz, Wenye Wang:
The predictive user mobility profile framework for wireless multimedia networks. IEEE/ACM Trans. Netw. 12(6): 1021-1035 (2004) - [c10]Xinbing Wang, Wenye Wang:
Energy-aware call admission control scheme in wireless cellular networks. GLOBECOM 2004: 1570-1574 - [c9]Wei Liang, Wenye Wang:
A dynamic security association control scheme for efficient authentication in wireless networks. GLOBECOM 2004: 3778-3782 - [c8]Wei Liang, Wenye Wang:
An Analytical Study on the Impact of Authentication in Wireless Local Area Network. ICCCN 2004: 361-366 - [c7]Wei Liang, Wenye Wang:
A cost-aware control scheme for efficient authentication in wireless networks. PIMRC 2004: 1548-1552 - [c6]Xinbing Wang, Wenye Wang:
An efficient negotiation protocol for real-time multimedia applications over wireless networks. WCNC 2004: 2533-2538 - 2002
- [j6]Ian F. Akyildiz, Wenye Wang:
A dynamic location management scheme for next-generation multitier PCS systems. IEEE Trans. Wirel. Commun. 1(1): 178-189 (2002) - [c5]Wenye Wang, Ian F. Akyildiz:
On the estimation of user mobility pattern for location tracking in wireless networks. GLOBECOM 2002: 610-614 - 2001
- [j5]Wenye Wang, Ian F. Akyildiz, Gordon L. Stüber:
An optimal paging scheme for minimizing signaling costs under delay bounds. IEEE Commun. Lett. 5(2): 43-45 (2001) - [j4]Wenye Wang, Ian F. Akyildiz:
A new signaling protocol for intersystem roaming in next-generation wireless systems. IEEE J. Sel. Areas Commun. 19(10): 2040-2052 (2001) - [j3]Wenye Wang, Ian F. Akyildiz, Gordon L. Stüber, Boo-Young Chung:
Effective Paging Schemes with Delay Bounds as QoS Constraints in Wireless Systems. Wirel. Networks 7(5): 455-466 (2001) - [c4]Wenye Wang, Ian F. Akyildiz:
A cost-efficient signaling protocol for mobility application part(MAP) in IMT-2000 systems. MobiCom 2001: 345-355 - 2000
- [c3]Wenye Wang, Ian F. Akyildiz, Gordon L. Stüber:
An optimal partition algorithm for minimization of paging costs. GLOBECOM 2000: 188-192 - [c2]Wenye Wang, Ian F. Akyildiz:
Intersystem location update and paging schemes for multitier wireless networks. MobiCom 2000: 99-109 - [c1]Wenye Wang, Ian F. Akyildiz, Gordon L. Stüber:
Reducing the paging costs under delay bounds for PCS networks. WCNC 2000: 253-257
1990 – 1999
- 1999
- [j2]Ian F. Akyildiz, Janise McNair, Joseph S. M. Ho, Hüseyin Uzunalioglu, Wenye Wang:
Mobility management in next-generation wireless systems. Proc. IEEE 87(8): 1347-1384 (1999) - 1998
- [j1]Ian F. Akyildiz, Janise McNair, Hüseyin Uzunalioglu, Wenye Wang:
Mobility management in current and future communications networks. IEEE Netw. 12(4): 39-49 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-05 01:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint