default search action
Wensheng Zhang 0001
Person information
- affiliation: Iowa State University, Department of Computer Science, USA
Other persons with the same name
- Wensheng Zhang — disambiguation page
- Wensheng Zhang 0002 — Chinese Academy of Sciences, Institute of Automation, Beijing, China
- Wensheng Zhang 0003 — Jiangxi University of Science and Technology, China
- Wensheng Zhang 0004 — Shandong University, Shandong Provincial Key Laboratory of Wireless Communication Technologies, China
- Wensheng Zhang 0005 — Xavier University of Louisiana, Bioinformatics Core of Xavier RCMI Center for Cancer Research, New Orleans, LA, USA (and 1 more)
- Wensheng Zhang 0006 — Keio University, Departement of Electrical and Electronics Engineering, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c75]Hongyi Bian, Wensheng Zhang, Carl K. Chang:
Clustering-based Mutual-Learning for Personalized Situation-Aware Services in Smart Homes. SSE 2024: 167-178 - 2023
- [c74]Pinglan Liu, Wensheng Zhang:
Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud. CLOUD 2023: 529-539 - [c73]Hongyi Bian, Rong N. Chang, Kumar Bhaskaran, Wensheng Zhang, Carl K. Chang:
Distributed and Intelligent API Mediation Service for Enterprise-Grade Hybrid-Multicloud Computing. SSE 2023: 1-11 - [c72]Hongyi Bian, Wensheng Zhang, Carl K. Chang:
Situ-Oracle: A Learning-Based Situation Analysis Servicing Framework for BIoT Systems. SSE 2023: 159-169 - [i8]Pinglan Liu, Wensheng Zhang:
Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud. CoRR abs/2308.00963 (2023) - 2022
- [c71]Pinglan Liu, Wensheng Zhang:
Towards Practical Privacy-Preserving Solution for Outsourced Neural Network Inference. CLOUD 2022: 357-362 - [c70]Chen-Yeou Yu, Wensheng Zhang, Carl K. Chang:
Edge-based Situ-aware Reinforcement Learning for Traffic Congestion Mitigation. ISC2 2022: 1-7 - [c69]Trent Muhr, Wensheng Zhang:
Privacy-Preserving Detection of Poisoning Attacks in Federated Learning. PST 2022: 1-10 - [i7]Pinglan Liu, Wensheng Zhang:
Towards Practical Privacy-Preserving Solution for Outsourced Neural Network Inference. CoRR abs/2206.02384 (2022) - 2021
- [c68]Pinglan Liu, Xiaojuan Ma, Wensheng Zhang:
Optimizing Fund Allocation for Game-Based Verifiable Computation Outsourcing. CloudComp 2021: 60-71 - [c67]Wensheng Zhang:
A Practical Oblivious Cloud Storage System based on TEE and Client Gateway. PST 2021: 1-6 - [c66]Wensheng Zhang, Trent Muhr:
TEE-based Selective Testing of Local Workers in Federated Learning Systems. PST 2021: 1-6 - [e1]Claudio Agostino Ardagna, Carl K. Chang, Ernesto Daminai, Rajiv Ranjan, Zhongjie Wang, Robert Ward, Jia Zhang, Wensheng Zhang:
14th IEEE International Conference on Cloud Computing, CLOUD 2021, Chicago, IL, USA, September 5-10, 2021. IEEE 2021, ISBN 978-1-6654-0060-2 [contents] - [i6]Pinglan Liu, Xiaojuan Ma, Wensheng Zhang:
Optimizing Fund Allocation for Game-based Verifiable Computation Outsourcing. CoRR abs/2103.06440 (2021) - [i5]Wensheng Zhang, Trent Muhr:
TEE-based Selective Testing of Local Workers in Federated Learning Systems. CoRR abs/2111.02662 (2021) - 2020
- [c65]Pinglan Liu, Wensheng Zhang:
Game Theoretic Approach for Secure and Efficient Heavy-Duty Smart Contracts. CNS 2020: 1-9 - [c64]Chen-Yeou Yu, Carl K. Chang, Wensheng Zhang:
A Situation Enabled Framework for Energy-Efficient Workload Offloading in 5G Vehicular Edge Computing. SERVICES 2020: 61-68
2010 – 2019
- 2019
- [j31]Qiumao Ma, Wensheng Zhang:
Octopus ORAM: An Oblivious RAM with Communication and Server Storage Efficiency. EAI Endorsed Trans. Security Safety 6(20): e5 (2019) - [c63]Qiumao Ma, Wensheng Zhang:
Efficient and Accountable Oblivious Cloud Storage with Three Servers. CNS 2019: 37-45 - 2018
- [c62]Pinglan Liu, Wensheng Zhang:
A New Game Theoretic Scheme for Verifiable Cloud Computing. IPCCC 2018: 1-8 - [c61]Qiumao Ma, Wensheng Zhang:
Towards Practical Protection of Data Access Pattern to Cloud Storage. MILCOM 2018: 1-9 - [c60]Wensheng Zhang, Chuang Wang:
LA ^3 : A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices. NSS 2018: 277-287 - 2017
- [j30]Zi Li, Wensheng Zhang, Daji Qiao, Yang Peng:
Lifetime balanced data aggregation for the internet of things. Comput. Electr. Eng. 58: 244-264 (2017) - [j29]Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao:
TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption. Future Internet 9(4): 57 (2017) - [j28]Yang Peng, Zi Li, Wensheng Zhang, Daji Qiao:
A lifetime-balancing MAC protocol under the end-to-end delay requirement. J. Commun. Networks 19(1): 51-64 (2017) - [j27]Hua Qin, Yang Peng, Wensheng Zhang:
Vehicles on RFID: Error-Cognitive Vehicle Localization in GPS-Less Environments. IEEE Trans. Veh. Technol. 66(11): 9943-9957 (2017) - 2016
- [c59]Qiumao Ma, Jinsheng Zhang, Yang Peng, Wensheng Zhang, Daji Qiao:
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage. CSCloud 2016: 20-25 - [c58]Yang Peng, Zi Li, Wensheng Zhang, Daji Qiao:
Dynamic sensing scheduling to prolong network lifetime under practical requirements. ICC 2016: 1-7 - [c57]Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao:
TSKT-ORAM: A two-server k-ary tree ORAM for access pattern protection in cloud storage. MILCOM 2016: 527-532 - [c56]Qiumao Ma, Wensheng Zhang, Jinsheng Zhang:
DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern. NSS 2016: 415-432 - [p2]Yang Peng, Wensheng Zhang, Daji Qiao:
Charging and Routing Activity Scheduling to Prolong Sensor Network Lifetime. Wireless Power Transfer Algorithms, Technologies and Applications in Ad Hoc Communication Networks 2016: 607-644 - [i4]Jinsheng Zhang, Wensheng Zhang, Daji Qiao:
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services. IACR Cryptol. ePrint Arch. 2016: 73 (2016) - [i3]Qiumao Ma, Jinsheng Zhang, Wensheng Zhang, Daji Qiao:
SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage. IACR Cryptol. ePrint Arch. 2016: 256 (2016) - [i2]Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao:
MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016: 882 (2016) - 2015
- [c55]Jinsheng Zhang, Wensheng Zhang, Daji Qiao:
GP-ORAM: A Generalized Partition ORAM. NSS 2015: 268-282 - 2014
- [j26]Jie Tian, Guiling Wang, Tan Yan, Wensheng Zhang:
Detect smart intruders in sensor networks by creating network dynamics. Comput. Networks 62: 182-196 (2014) - [j25]Jie Tian, Wensheng Zhang, Guiling Wang, Xin Gao:
2D k-barrier duty-cycle scheduling for intruder detection in Wireless Sensor Networks. Comput. Commun. 43: 31-42 (2014) - [j24]Hua Qin, Wensheng Zhang:
ZigBee-Assisted Power Saving Management for Mobile Devices. IEEE Trans. Mob. Comput. 13(12): 2933-2947 (2014) - [j23]Tan Yan, Wensheng Zhang, Guiling Wang, Yujun Zhang:
Access Points Planning in Urban Area for Data Dissemination to Drivers. IEEE Trans. Veh. Technol. 63(1): 390-402 (2014) - [j22]Tan Yan, Wensheng Zhang, Guiling Wang:
DOVE: Data Dissemination to a Desired Number of Receivers in VANET. IEEE Trans. Veh. Technol. 63(4): 1903-1916 (2014) - [j21]Tan Yan, Wensheng Zhang, Guiling Wang:
A Grid-Based On-Road Localization System in VANET with Linear Error Propagation. IEEE Trans. Wirel. Commun. 13(2): 861-875 (2014) - [c54]Jinsheng Zhang, Wensheng Zhang, Daji Qiao:
S-ORAM: a segmentation-based oblivious RAM. AsiaCCS 2014: 147-158 - [c53]Keji Hu, Wensheng Zhang:
Efficient verification of data encryption on cloud servers. PST 2014: 314-321 - [c52]Zi Li, Yang Peng, Daji Qiao, Wensheng Zhang:
Joint charging and rate allocation for utility maximization in sustainable sensor networks. SECON 2014: 459-467 - [i1]Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao:
KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes. IACR Cryptol. ePrint Arch. 2014: 624 (2014) - 2013
- [j20]Dong Seong Kim, Sunho Lim, Wensheng Zhang:
Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications. Int. J. Distributed Sens. Networks 9 (2013) - [j19]Hua Qin, Wensheng Zhang:
ZigBee-Assisted Power Saving for More Efficient and Sustainable Ad Hoc Networks. IEEE Trans. Wirel. Commun. 12(12): 6180-6193 (2013) - [c51]Zi Li, Yang Peng, Daji Qiao, Wensheng Zhang:
Joint Aggregation and MAC design to prolong sensor network lifetime. ICNP 2013: 1-10 - [c50]Yang Peng, Zi Li, Daji Qiao, Wensheng Zhang:
I2C: A holistic approach to prolong the sensor network lifetime. INFOCOM 2013: 2670-2678 - 2012
- [j18]Chuang Wang, Taiming Feng, Jinsook Kim, Guiling Wang, Wensheng Zhang:
Catching Packet Droppers and Modifiers in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 23(5): 835-843 (2012) - [c49]Zi Li, Yang Peng, Daji Qiao, Wensheng Zhang:
LBA: Lifetime balanced data aggregation in low duty cycle sensor networks. INFOCOM 2012: 1844-1852 - [c48]Hua Qin, Wensheng Zhang:
ZigBee-assisted Power Saving Management for mobile devices. MASS 2012: 93-101 - [c47]Tan Yan, Wensheng Zhang, Guiling Wang:
DOVE: Data dissemination to a fixed number of receivers in VANET. SECON 2012: 272-280 - [c46]Yang Peng, Zi Li, Wensheng Zhang, Daji Qiao:
LB-MAC: A Lifetime-Balanced MAC Protocol for Sensor Networks. WASA 2012: 272-291 - 2011
- [j17]Jie Tian, Guiling Wang, Tan Yan, Wensheng Zhang:
A Distributed Scheme for Securing Middle-Tier Multicast in Hierarchical Sensor Networks. Ad Hoc Sens. Wirel. Networks 11(3-4): 245-264 (2011) - [j16]Guiling Wang, Mary Jane Irwin, Haoying Fu, Piotr Berman, Wensheng Zhang, Tom La Porta:
Optimizing sensor movement planning for energy efficiency. ACM Trans. Sens. Networks 7(4): 33:1-33:17 (2011) - [j15]Bin Tong, Guiling Wang, Wensheng Zhang, Chuang Wang:
Node Reclamation and Replacement for Long-Lived Sensor Networks. IEEE Trans. Parallel Distributed Syst. 22(9): 1550-1563 (2011) - [c45]Ka Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao:
A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds. ESORICS 2011: 528-547 - [c44]Zi Li, Yang Peng, Wensheng Zhang, Daji Qiao:
J-RoC: A Joint Routing and Charging scheme to prolong sensor network lifetime. ICNP 2011: 373-382 - [c43]Chuang Wang, Guiling Wang, Wensheng Zhang, Taiming Feng:
Reconciling privacy preservation and intrusion detection in sensory data aggregation. INFOCOM 2011: 336-340 - [c42]Yang Peng, Zi Li, Daji Qiao, Wensheng Zhang:
Delay-bounded MAC with minimal idle listening for sensor networks. INFOCOM 2011: 1314-1322 - [c41]Tan Yan, Wensheng Zhang, Guiling Wang, Yujun Zhang:
GOT: Grid-Based On-Road Localization through Inter-Vehicle Collaboration. MASS 2011: 13-18 - [c40]Hua Qin, Xuejia Lu, Yanfei Wang, Guiling Wang, Wensheng Zhang, Yaying Zhang:
Heterogeneity-Aware Design for Automatic Detection of Problematic Road Conditions. MASS 2011: 252-261 - [c39]Hua Qin, Wensheng Zhang:
Charging scheduling with minimal waiting in a network of electric vehicles and charging stations. Vehicular Ad Hoc Networks 2011: 51-60 - [c38]Hua Qin, Yanfei Wang, Wensheng Zhang:
ZigBee-Assisted WiFi Transmission for Multi-interface Mobile Devices. MobiQuitous 2011: 248-259 - [r3]Wensheng Zhang:
False Data Injection Defense. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 448-450 - [r2]Wensheng Zhang:
Secure Data Aggregation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1104-1105 - [r1]Wensheng Zhang:
Source Location Privacy. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1230-1231 - 2010
- [j14]Bin Tong, Santosh Panchapakesan, Wensheng Zhang:
A three-tier framework for intruder information sharing in sensor networks. Ad Hoc Networks 8(3): 345-360 (2010) - [j13]Renita Machado, Sirin Tekinay, Wensheng Zhang, Guiling Wang:
Diffusion-based approach to deploying wireless sensor networks. Int. J. Sens. Networks 8(3/4): 222-232 (2010) - [j12]Taiming Feng, Lu Ruan, Wensheng Zhang:
Intelligent p-Cycle Protection for Dynamic Multicast Sessions in WDM Networks. JOCN 2(7): 389-399 (2010) - [j11]Renita Machado, Wensheng Zhang, Guiling Wang, Sirin Tekinay:
Coverage properties of clustered wireless sensor networks. ACM Trans. Sens. Networks 7(2): 13:1-13:21 (2010) - [c37]Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang:
How Wireless Power Charging Technology Affects Sensor Network Deployment and Routing. ICDCS 2010: 438-447 - [c36]Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang:
Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks. INFOCOM 2010: 1891-1899 - [c35]Hua Qin, Zi Li, Yanfei Wang, Xuejia Lu, Wensheng Zhang, Guiling Wang:
An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments. PerCom 2010: 79-87 - [c34]Ka Yang, Daji Qiao, Wensheng Zhang:
Sensor-Aided Navigation in GPS-Denied Environments. QSHINE 2010: 345-361 - [c33]Yang Peng, Zi Li, Wensheng Zhang, Daji Qiao:
Prolonging Sensor Network Lifetime Through Wireless Charging. RTSS 2010: 129-139 - [c32]Zi Li, Yang Peng, Wensheng Zhang, Daji Qiao:
Study of Joint Routing and Wireless Charging Strategies in Sensor Networks. WASA 2010: 125-135
2000 – 2009
- 2009
- [j10]Wensheng Zhang, Sencun Zhu, Guohong Cao:
Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad Hoc Networks 7(6): 1229-1242 (2009) - [j9]Wensheng Zhang, Sencun Zhu, Guohong Cao:
Editorial for special issue on privacy and security in wireless sensorand ad hoc networks. Ad Hoc Networks 7(8): 1431-1433 (2009) - [j8]Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao, Yi Yang:
pDCS: Security and Privacy Support for Data-Centric Sensor Networks. IEEE Trans. Mob. Comput. 8(8): 1023-1038 (2009) - [c31]Jie Tian, Guiling Wang, Tan Yan, Wensheng Zhang:
A Power-Efficient Scheme for Securing Multicast in Hierarchical Sensor Networks. ICCCN 2009: 1-6 - [c30]Renita Machado, Wensheng Zhang, Guiling Wang:
Network Planning for Heterogeneous Wireless Sensor Networks in Environmental Survivability. ICTAI 2009: 814-821 - [c29]Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Qiao:
ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query. INFOCOM 2009: 936-944 - [c28]Ka Yang, Nalin Subramanian, Daji Qiao, Wensheng Zhang:
EagleVision: A pervasive mobile device protection system. MobiQuitous 2009: 1-10 - [c27]Bin Tong, Zi Li, Guiling Wang, Wensheng Zhang:
On-Demand Node Reclamation and Replacement for Guaranteed Area Coverage in Long-Lived Sensor Networks. QSHINE 2009: 148-166 - [c26]Bin Tong, Guiling Wang, Wensheng Zhang, Chuang Wang:
Node Reclamation and Replacement for Long-lived Sensor Networks. SECON 2009: 1-9 - [c25]Chuang Wang, Taiming Feng, Jinsook Kim, Guiling Wang, Wensheng Zhang:
Catching Packet Droppers and Modifiers in Wireless Sensor Networks. SECON 2009: 1-9 - 2008
- [j7]Wensheng Zhang, Guohong Cao:
Defending against cache consistency attacks in wireless ad hoc networks. Ad Hoc Networks 6(3): 363-379 (2008) - [j6]Hui Song, Sencun Zhu, Wensheng Zhang, Guohong Cao:
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. ACM Trans. Sens. Networks 4(4): 23:1-23:34 (2008) - [c24]Taiming Feng, Lu Ruan, Wensheng Zhang:
Intelligent p-Cycle Protection for Multicast Sessions in WDM Networks. ICC 2008: 5165-5169 - [c23]Taiming Feng, Chuang Wang, Wensheng Zhang, Lu Ruan:
Confidentiality Protection for Distributed Sensor Data Aggregation. INFOCOM 2008: 56-60 - [c22]Wensheng Zhang, Nalin Subramanian, Guiling Wang:
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks. INFOCOM 2008: 1418-1426 - [c21]Guanqun Yang, Bin Tong, Daji Qiao, Wensheng Zhang:
Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks. INFOCOM 2008: 2216-2224 - [c20]Wensheng Zhang, Chuang Wang, Taiming Feng:
GP^2S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data (concise contribution). PerCom 2008: 179-184 - [c19]Bin Tong, Santosh Panchapakesan, Wensheng Zhang:
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks. SECON 2008: 451-459 - [c18]Xia Wang, Johnny Wong, Wensheng Zhang:
A heterogeneity-aware framework for group key management in wireless mesh networks. SecureComm 2008: 32 - [c17]Youssef Hanna, Hridesh Rajan, Wensheng Zhang:
Slede: a domain-specific verification framework for sensor network security protocol implementations. WISEC 2008: 109-118 - 2007
- [j5]Nalin Subramanian, Chanjun Yang, Wensheng Zhang:
Securing distributed data storage and retrieval in sensor networks. Pervasive Mob. Comput. 3(6): 659-676 (2007) - [j4]Wensheng Zhang, Guohong Cao, Tom La Porta:
Data Dissemination with Ring-Based Index for Wireless Sensor Networks. IEEE Trans. Mob. Comput. 6(7): 832-847 (2007) - [j3]Wensheng Zhang, Guohong Cao, Tom La Porta:
Dynamic proxy tree-based data dissemination schemes for wireless sensor networks. Wirel. Networks 13(5): 583-595 (2007) - [c16]Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang, Johnny Wong:
Specification Synthesis for Monitoring and Analysis of MANET Protocols. AINA Workshops (1) 2007: 183-187 - [c15]Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao:
pDCS: Security and Privacy Support for Data-Centric Sensor Networks. INFOCOM 2007: 1298-1306 - [c14]Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao:
A random perturbation-based scheme for pairwise key establishment in sensor networks. MobiHoc 2007: 90-99 - [c13]Nalin Subramanian, Chanjun Yang, Wensheng Zhang:
Securing Distributed Data Storage and Retrieval in Sensor Networks. PerCom 2007: 191-200 - [c12]Jianming Zhou, Wensheng Zhang, Daji Qiao:
Protecting storage location privacy in sensor networks. QSHINE 2007: 22 - 2006
- [c11]Qiu Li, Xuexi Chen, Hongbo Zhang, Junhai Gao, Wensheng Zhang, Changao Shi:
A 3D Integral Data Model for Subsurface Entities Based on Extended GTP. IGARSS 2006: 1519-1522 - [c10]Chanjun Yang, Jianming Zhou, Wensheng Zhang, Johnny Wong:
Pairwise key establishment for large-scale sensor networks: from identifier-based to location-based. Infoscale 2006: 27 - [c9]Scott C.-H. Huang, Hao Zhu, Wensheng Zhang:
SAP: seamless authentication protocol for vertical handoff in heterogeneous wireless networks. QSHINE 2006: 32 - 2005
- [c8]Wensheng Zhang, Guohong Cao:
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. INFOCOM 2005: 503-514 - [c7]Guiling Wang, Guohong Cao, Thomas F. La Porta, Wensheng Zhang:
Sensor relocation in mobile sensor networks. INFOCOM 2005: 2302-2312 - [c6]Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao:
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. MobiHoc 2005: 378-389 - [c5]Wensheng Zhang, Guohong Cao:
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks. MobiQuitous 2005: 22-32 - [p1]Guohong Cao, Guiling Wang, Tom La Porta, Shashi Phoha, Wensheng Zhang:
Distributed Algorithms for Deploying Mobile Sensors. Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks 2005: 427-440 - 2004
- [j2]Wensheng Zhang, Guohong Cao:
DCTC: dynamic convoy tree-based collaboration for target tracking in sensor networks. IEEE Trans. Wirel. Commun. 3(5): 1689-1701 (2004) - [c4]Wensheng Zhang, Guohong Cao:
Optimizing Tree Reconfiguration for Mobile Target Tracking in Sensor Networks. INFOCOM 2004: 2434-2445 - [c3]Wensheng Zhang, Guohong Cao, Tom La Porta:
Dynamic proxy tree-based data dissemination schemes for wireless sensor networks. MASS 2004: 21-30 - 2003
- [j1]Wensheng Zhang, Guohong Cao:
Optimizing tree reconfiguration to track mobile targets in sensor networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(3): 39-40 (2003) - [c2]Wensheng Zhang, Guohong Cao, Thomas F. La Porta:
Data Dissemination with Ring-Based Index for Wireless Sensor Networks. ICNP 2003: 305-314 - 2002
- [c1]Wensheng Zhang, Hao Zhu, Guohong Cao:
Improving Bluetooth network performance through a time-slot leasing approach. WCNC 2002: 592-596
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint