default search action
Bo Sun 0001
Person information
- affiliation: Lamar University, Department of Computer Science, Beaumont, TX, USA
- affiliation (PhD 2004): Texas A&M University, Department of Computer Science, College Station, TX, USA
Other persons with the same name
- Bo Sun — disambiguation page
- Bo Sun 0002 — Beihang University, School of Reliability and Systems Engineering, Beijing, China
- Bo Sun 0003 — Tianjin University, State Key Laboratory of Precision Measuring Technology and Instruments, China
- Bo Sun 0004 — Hong Kong University of Science and Technology, Department of Electronic and Computer Engineering, Hong Kong
- Bo Sun 0005 — University of Bergen, Department of Informatics, Norway
- Bo Sun 0006 — Beijing Normal University, College of Information Science and Technology, China
- Bo Sun 0008 — Central University of Finance and Economics, School of Statistics and Mathematics, Beijing, China
- Bo Sun 0009 — Chinese Academy of Sciences, Jinjiang, Quanzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j32]Miao Peng, Yang Xiao, Bo Sun:
Utilisation and energy consumption of fair-access in sensor networks with selected grid topologies. Int. J. Ad Hoc Ubiquitous Comput. 24(1/2): 117-133 (2017) - 2016
- [j31]Bo Sun, Farhad Ahmed, Frank Sun, Qin Qian, Yang Xiao:
Water quality monitoring using STORM 3 Data Loggers and a wireless sensor network. Int. J. Sens. Networks 20(1): 26-36 (2016) - [j30]Fnu Shalini, Yang Xiao, Bo Sun:
Security Issues in ProtoGENI. EAI Endorsed Trans. Ind. Networks Intell. Syst. 3(6): e1 (2016) - [j29]Lei Zeng, Yang Xiao, Hui Chen, Bo Sun, Wenlin Han:
Computer operating system logging and security issues: a survey. Secur. Commun. Networks 9(17): 4804-4821 (2016) - [j28]Yegui Cai, F. Richard Yu, Chengchao Liang, Bo Sun, Qiao Yan:
Software-Defined Device-to-Device (D2D) Communications in Virtual Wireless Networks With Imperfect Network State Information (NSI). IEEE Trans. Veh. Technol. 65(9): 7349-7360 (2016) - 2015
- [j27]Fnu Shalini, Yang Xiao, Bo Sun:
ProtoGENI experiments. Int. J. Secur. Networks 10(4): 239-254 (2015) - [j26]Bo Sun, Md. Abu Shufean, Frank Sun:
A geographic information system framework for data visualisation in wireless sensor networks. Int. J. Sens. Networks 19(1): 51-61 (2015) - 2013
- [j25]Bo Sun, Xuemei Shan, Kui Wu, Yang Xiao:
Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks. IEEE Syst. J. 7(1): 13-25 (2013) - [c36]Jonathan Jao, Bo Sun, Kui Wu:
A Prototype Wireless Sensor Network for Precision Agriculture. ICDCS Workshops 2013: 280-285 - 2012
- [j24]Majid Khojastehpour, S. Kami Makki, Bo Sun:
A delineated R-tree indexing method for managing moving objects. Int. J. Inf. Decis. Sci. 4(2/3): 182-198 (2012) - [c35]Ramon Sandoval, S. Kami Makki, Bo Sun:
Utilizing silent negative voting and sleep/wakeup method for power efficient data fusion. ICNC 2012: 1000-1004 - 2011
- [j23]S. Kami Makki, Bo Sun, Ricky Guidry, Jeffery Hill:
Efficient Monitoring Strategy for Active Environments. J. Softw. 6(4): 536-543 (2011) - [j22]Ruhai Wang, Scott C. Burleigh, Paavan Parikh, Che-Jen Lin, Bo Sun:
Licklider transmission protocol (LTP)-based DTN for cislunar communications. IEEE/ACM Trans. Netw. 19(2): 359-368 (2011) - [j21]Alina Olteanu, Yang Xiao, Fei Hu, Bo Sun, Hongmei Deng:
A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID. Wirel. Commun. Mob. Comput. 11(2): 254-266 (2011) - [j20]F. Richard Yu, Bo Sun, Vikram Krishnamurthy, Saqib Ali:
Application layer QoS optimization for multimedia transmission over cognitive radio networks. Wirel. Networks 17(2): 371-383 (2011) - [c34]James Carnley, Bo Sun, S. Kami Makki:
TORP: TinyOS Opportunistic Routing Protocol for Wireless Sensor Networks. CCNC 2011: 111-115 - [c33]Manoj K. Joshi, Lawrence Osborne, Bo Sun, S. Kami Makki:
Hot spot aware energy efficient clustering approach for Wireless Sensor Networks. CCNC 2011: 585-589 - [c32]Amir Husain, S. Kami Makki, Lawrence Osborne, Bo Sun:
A Highly Adaptable Information Dissemination Strategy. DEIS 2011: 331-338 - [i1]F. Richard Yu, Bo Sun, Vikram Krishnamurthy, Saqib Ali:
QoS Provisioning for Multimedia Transmission in Cognitive Radio Networks. CoRR abs/1104.5534 (2011) - 2010
- [j19]Yang Xiao, Hui Chen, Kui Wu, Bo Sun, Ying Zhang, Xinyu Sun, Chong Liu:
Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks. IEEE Trans. Computers 59(4): 507-521 (2010) - [c31]Jeffery Hill, Ricky Guidry, S. Kami Makki, Bo Sun:
Intelligent Sensor Independent Decisions for Entropic Targets. ITNG 2010: 660-665
2000 – 2009
- 2009
- [j18]Bo Sun, Guanhua Yan, Yang Xiao, T. Andrew Yang:
Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications. Ad Hoc Networks 7(8): 1489-1500 (2009) - [j17]Yang Xiao, Yanping Zhang, Miao Peng, Hui Chen, Xiaojiang Du, Bo Sun, Kui Wu:
Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks. Comput. Networks 53(14): 2458-2475 (2009) - [j16]Ruhai Wang, Tarik Taleb, Abbas Jamalipour, Bo Sun:
Protocols for reliable data transport in space internet. IEEE Commun. Surv. Tutorials 11(2): 21-32 (2009) - [c30]S. Kami Makki, Bo Sun, Majid Khojastehpour:
An Efficient Information Access Scheme for Mobile Objects. IRI 2009: 312-317 - [c29]Guanhua Yan, Stephan J. Eidenbenz, Bo Sun:
Mobi-watchdog: you can steal, but you can't run! WISEC 2009: 139-150 - 2008
- [j15]Bo Sun, Yang Xiao, Chung-Chih Li, Hsiao-Hwa Chen, T. Andrew Yang:
Security co-existence of wireless sensor networks and RFID for pervasive computing. Comput. Commun. 31(18): 4294-4303 (2008) - [c28]Alina Olteanu, Yang Xiao, Fei Hu, Bo Sun:
A Lightweight Block Cipher Based on a Multiple Recursive Generator. GLOBECOM 2008: 1847-1851 - [c27]Bo Sun, Dibesh Shrestha, Guanhua Yan, Yang Xiao:
Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications. GLOBECOM 2008: 4961-4965 - [c26]Bo Sun, Guanhua Yan, Yang Xiao:
Worm Propagation Dynamics in Wireless Sensor Networks. ICC 2008: 1541-1545 - [c25]Kui Wu, Yang Xiao, Jie Li, Bo Sun:
A Distributed Algorithm for Finding Global Icebergs with Linked Counting Bloom Filters. ICC 2008: 2757-2761 - [c24]Yang Xiao, Hui Chen, Yanping Zhang, Xiaojiang Du, Bo Sun, Kui Wu:
Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks. ICDCS Workshops 2008: 315-320 - [c23]Yanping Zhang, Yang Xiao, Kui Wu, Xiaojiang Du, Bo Sun:
Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks. MSN 2008: 16-22 - 2007
- [j14]Kui Wu, Dennis Dreef, Bo Sun, Yang Xiao:
Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Networks 5(1): 100-111 (2007) - [j13]Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, Michael Galloway:
A survey of key management schemes in wireless sensor networks. Comput. Commun. 30(11-12): 2314-2341 (2007) - [j12]Bo Sun, Kui Wu, Yang Xiao, Ruhai Wang:
Integration of mobility and intrusion detection for wireless ad hoc networks. Int. J. Commun. Syst. 20(6): 695-721 (2007) - [j11]William Stewart, Yang Xiao, Bo Sun, Hsiao-Hwa Chen:
Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks. Int. J. Wirel. Mob. Comput. 2(1): 14-27 (2007) - [j10]Bo Sun, Yang Xiao, Ruhai Wang:
Detection of Fraudulent Usage in Wireless Networks. IEEE Trans. Veh. Technol. 56(6): 3912-3923 (2007) - [j9]Yang Xiao, Hui Chen, Hsiao-Hwa Chen, Bo Sun, C. L. Philip Chen:
Optimal Utilization and Effects of Inaccurate Estimation in Mobile Database Failure Restoration. IEEE Trans. Wirel. Commun. 6(6): 2086-2095 (2007) - [j8]Bo Sun, Lawrence Osborne, Yang Xiao, Sghaier Guizani:
Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wirel. Commun. 14(5): 56-63 (2007) - [c22]Bo Sun, Nilam Chand, Kui Wu, Yang Xiao:
Change-Point Monitoring for Secure In-Network Aggregation in Wireless Sensor Networks. GLOBECOM 2007: 936-940 - [c21]Bo Sun, Xing Jin, Kui Wu, Yang Xiao:
Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks. ICC 2007: 1466-1471 - [c20]Ruhai Wang, Anil Ayyagari, Xuan Wu, Bo Sun, Wei Tai Hsu:
Experimental Performance Comparison of Rate-based and Store-and-Forward Transmission Mechanisms over Error-Prone Cislunar Communication Links. ICC 2007: 4518-4522 - [c19]Yang Xiao, Hui Chen, Kui Wu, Bo Sun, Chong Liu:
Modeling Detection Metrics in Randomized Scheduling Algorithm in Wireless Sensor Networks. WCNC 2007: 3741-3745 - 2006
- [j7]Bo Sun, Kui Wu, Udo W. Pooch:
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 2(3): 297-324 (2006) - [j6]Yang Xiao, Xuemin (Sherman) Shen, Bo Sun, Lin Cai:
Security and privacy in RFID and applications in telemedicine. IEEE Commun. Mag. 44(4): 64-72 (2006) - [j5]Bo Sun, Chung-Chih Li, Kui Wu, Yang Xiao:
A lightweight secure protocol for wireless sensor networks. Comput. Commun. 29(13-14): 2556-2568 (2006) - [j4]Yang Xiao, Hsiao-Hwa Chen, Bo Sun, Ruhai Wang, Sakshi Sethi:
MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2006 (2006) - [j3]Chong Liu, Kui Wu, Yang Xiao, Bo Sun:
Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 17(6): 562-575 (2006) - [j2]Bo Sun, Fei Richard Yu, Kui Wu, Yang Xiao, Victor C. M. Leung:
Enhancing security using mobility-based anomaly detection in cellular mobile networks. IEEE Trans. Veh. Technol. 55(4): 1385-1396 (2006) - [c18]Bo Sun, Zhi Chen, Ruhai Wang, Fei Richard Yu, Victor C. M. Leung:
Towards adaptive anomaly detection in cellular mobile networks. CCNC 2006: 666-670 - [c17]William Stewart, Yang Xiao, Bo Sun, Hsiao-Hwa Chen, Sghaier Guizani:
Security Issues in the IEEE 802.15.3 WPANs. GLOBECOM 2006 - [c16]Bo Sun, Xing Jin, Yang Xiao, Ruhai Wang:
Enhancing Security using Mobility Profile for Cellular Mobile Networks. GLOBECOM 2006 - [c15]Bo Sun, Chung-Chih Li, Yang Xiao:
A Lightweight Secure Solution for RFID. GLOBECOM 2006 - [c14]Bo Sun, Yang Xiao, Ruhai Wang, Sghaier Guizani:
Enhancing Security using Calling Activity for Wireless Networks. GLOBECOM 2006 - [c13]Ruhai Wang, Stephen Horan, Sastri Kota, Bo Sun:
An Experimental Evaluation of SCPS-TP over Lossy GEO-Space Links. GLOBECOM 2006 - [c12]Ruhai Wang, B. Tian, Bo Sun, Sghaier Guizani, Yang Xiao:
Configurable Acknowledgment Delay (CAD) Mechanism for Asymmetric Space-Internet Links. GLOBECOM 2006 - [c11]Yang Xiao, Hui Chen, Kui Wu, Chong Liu, Bo Sun:
Maximizing Network Lifetime under QoS Constraints in Wireless Sensor Networks. GLOBECOM 2006 - [c10]Yang Xiao, Bo Sun, Hsiao-Hwa Chen, Sghaier Guizani, Ruhai Wang:
Performance Analysis of Advanced Encryption Standard (AES). GLOBECOM 2006 - [c9]Bo Sun, Chung-Chih Li, Kui Wu, Yang Xiao:
A LCG-based Secure Protocol for Wireless Sensor Networks. ICC 2006: 3627-3632 - [c8]Kui Wu, Dennis Dreef, Bo Sun, Yang Xiao:
Secure data aggregation without persistent cryptographic operations in wireless sensor networks. IPCCC 2006 - 2005
- [b1]Bo Sun:
Intrusion detection in mobile ad hoc networks. Texas A&M University, College Station, USA, 2005 - [j1]Ruhai Wang, Bhanu Gutha, Stephen Horan, Yang Xiao, Bo Sun:
Which transmission mechanism is best for space Internet: window-based, rate-based, or a hybrid of the two? IEEE Wirel. Commun. 12(6): 42-49 (2005) - [c7]Chung-Chih Li, Bo Sun:
Using Linear Congruential Generators for Cryptographic Purposes. CATA 2005: 13-19 - [c6]Ru H. Wang, Stephen Horan, Bhanu Gutha, Bo Sun, Pranay K. R. Reguri:
An experimental analysis of rate-based and window-based transmission mechanisms over simulated space-Internet links. GLOBECOM 2005: 5 - [c5]Yang Xiao, Sakshi Sethi, Hsiao-Hwa Chen, Bo Sun:
Security services and enhancements in the IEEE 802.15.4 wireless sensor networks. GLOBECOM 2005: 5 - 2004
- [c4]Bo Sun, Kui Wu, Udo W. Pooch:
Towards adaptive intrusion detection in mobile ad hoc networks. GLOBECOM 2004: 3551-3555 - [c3]Bo Sun, Fei Richard Yu, Kui Wu, Victor C. M. Leung:
Mobility-based anomaly detection in cellular mobile networks. Workshop on Wireless Security 2004: 61-69 - 2003
- [c2]Bo Sun, Kui Wu, Udo W. Pooch:
Routing anomaly detection in mobile ad hoc networks. ICCCN 2003: 25-31 - [c1]Bo Sun, Kui Wu, Udo W. Pooch:
Alert aggregation in mobile ad hoc networks. Workshop on Wireless Security 2003: 69-78
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-10 18:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint