default search action
Long Cheng 0005
Person information
- affiliation: Clemson University, SC, USA
- affiliation (former): Beihang University, State Key Lab of Virtual Reality Technology and Systems, China
- affiliation (former): Virginia Tech, VA, USA
- affiliation (former): Singapore University of Technology and Design, Singapore
- affiliation (former): Beijing University of Posts and Telecommunications, China
Other persons with the same name
- Long Cheng — disambiguation page
- Long Cheng 0001 — Chinese Academy of Sciences, Institute of Automation, Beijing, China (and 4 more)
- Long Cheng 0002 — Northeastern University China, School of Information Science and Engineering, Shenyang, China (and 1 more)
- Long Cheng 0003 — North China Electric Power University, Beijing, China (and 5 more)
- Long Cheng 0004 — Shenyang Ligong University, School of Information Science and Engineering, Shenyang, China
- Long Cheng 0006 — Southeast University, Jiangsu Province Collaborative Innovation Center of Modern Urban Traffic Technologies, Nanjing, China
- Long Cheng 0007 — Sun Yat-sen University, School of Data and Computer Science, Guangzhou, China (and 1 more)
- Long Cheng 0008 — Beijing Jiaotong University, National Active Distribution Network Technology Research Center, China
- Long Cheng 0009 — University of Electronic Science and Technology of China, National Key Laboratory of Science and Technology on Communications, Chengdu, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Douglas Everson, Long Cheng:
A Survey on Network Attack Surface Mapping. DTRAP 5(2): 18:1-18:25 (2024) - [j36]Mohammed Aldeen, Jeffrey Young, Song Liao, Tsu-Yao Chang, Long Cheng, Haipeng Cai, Xiapu Luo, Hongxin Hu:
End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(3): 89:1-89:28 (2024) - [j35]Junqin Huang, Linghe Kong, Long Cheng, Hong-Ning Dai, Meikang Qiu, Guihai Chen, Xue (Steve) Liu, Gang Huang:
BlockSense: Towards Trustworthy Mobile Crowdsensing via Proof-of-Data Blockchain. IEEE Trans. Mob. Comput. 23(2): 1016-1033 (2024) - [c76]Wenbo Ding, Song Liao, Long Cheng, Xianghang Mi, Ziming Zhao, Hongxin Hu:
Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform. AsiaCCS 2024 - [c75]Song Liao, Long Cheng, Xiapu Luo, Zheng Song, Haipeng Cai, Danfeng (Daphne) Yao, Hongxin Hu:
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem. CCS 2024: 1626-1640 - [c74]Mohammed Aldeen, Pedram MohajerAnsari, Jin Ma, Mashrur Chowdhury, Long Cheng, Mert D. Pesé:
An Initial Exploration of Employing Large Multimodal Models in Defending Against Autonomous Vehicles Attacks. IV 2024: 3334-3341 - [c73]Sihan Yu, Jingjing Fu, Chenxu Jiang, ChunChih Lin, Zhenkai Zhang, Long Cheng, Ming Li, Xiaonan Zhang, Linke Guo:
FreeEM: Uncovering Parallel Memory EMR Covert Communication in Volatile Environments. MobiSys 2024: 372-384 - [c72]Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, Ziming Zhao, Hongxin Hu:
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models. SP 2024: 788-806 - [c71]Song Liao, Mohammed Aldeen, Jingwen Yan, Long Cheng, Xiapu Luo, Haipeng Cai, Hongxin Hu:
Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces. WWW 2024: 1081-1091 - [i13]Yu Nong, Mohammed Aldeen, Long Cheng, Hongxin Hu, Feng Chen, Haipeng Cai:
Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities. CoRR abs/2402.17230 (2024) - [i12]Ebuka Okpala, Nishant Vishwamitra, Keyan Guo, Song Liao, Long Cheng, Hongxin Hu, Yongkai Wu, Xiaohong Yuan, Jeannette Wade, Sajad Khorsandroo:
AI-Cybersecurity Education Through Designing AI-based Cyberharassment Detection Lab. CoRR abs/2405.08125 (2024) - [i11]Yu Nong, Haoran Yang, Long Cheng, Hongxin Hu, Haipeng Cai:
Automated Software Vulnerability Patching using Large Language Models. CoRR abs/2408.13597 (2024) - [i10]Niloufar Mehrabi, Sayed Pedram Haeri Boroujeni, Jenna Hofseth, Abolfazl Razi, Long Cheng, Manveen Kaur, Jim Martin, Rahul Amin:
Adaptive Data Transport Mechanism for UAV Surveillance Missions in Lossy Environments. CoRR abs/2410.10843 (2024) - 2023
- [j34]Matthew Costello, Nishant Vishwamitra, Song Liao, Long Cheng, Feng Luo, Hongxin Hu:
COVID-19 and Sinophobia: Detecting Warning Signs of Radicalization on Twitter and Reddit. Cyberpsychology Behav. Soc. Netw. 26(7): 546-553 (2023) - [j33]John Anderson, Qiqing Huang, Long Cheng, Hongxin Hu:
A Zero-Trust Architecture for Connected and Autonomous Vehicles. IEEE Internet Comput. 27(5): 7-14 (2023) - [c70]Nishant Vishwamitra, Keyan Guo, Song Liao, Jaden Mu, Zheyuan Ma, Long Cheng, Ziming Zhao, Hongxin Hu:
Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter. ASONAM 2023: 103-107 - [c69]Manveen Kaur, Abolfazl Razi, Long Cheng, Rahul Amin, Jim Martin:
Design and Evaluation of an Application-Oriented Data-Centric Communication Framework for Emerging Cyber-Physical Systems. CCNC 2023: 875-878 - [c68]Wen Li, Haoran Yang, Xiapu Luo, Long Cheng, Haipeng Cai:
PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing. CCS 2023: 1645-1659 - [c67]Song Liao, Long Cheng, Haipeng Cai, Linke Guo, Hongxin Hu:
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase. CCS 2023: 2321-2335 - [c66]Mohammed Aldeen, Joshua Luo, Ashley Lian, Venus Zheng, Allen Hong, Preethika Yetukuri, Long Cheng:
ChatGPT vs. Human Annotators: A Comprehensive Analysis of ChatGPT for Text Annotation. ICMLA 2023: 602-609 - [c65]Song Liao, Ebuka Okpala, Long Cheng, Mingqi Li, Nishant Vishwamitra, Hongxin Hu, Feng Luo, Matthew Costello:
Analysis of COVID-19 Offensive Tweets and Their Targets. KDD 2023: 4473-4484 - [c64]Wenbo Ding, Song Liao, Keyan Guo, Fuqiang Zhang, Long Cheng, Ziming Zhao, Hongxin Hu:
Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles. SmartSP 2023: 3-14 - [c63]Wen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai:
PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems. USENIX Security Symposium 2023: 1379-1396 - [i9]Song Liao, Long Cheng, Haipeng Cai, Linke Guo, Hongxin Hu:
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase. CoRR abs/2309.05867 (2023) - [i8]Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, Ziming Zhao, Hongxin Hu:
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models. CoRR abs/2312.15099 (2023) - 2022
- [j32]Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng (Daphne) Yao:
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities. ACM Comput. Surv. 54(5): 106:1-106:36 (2022) - [j31]Hao Zheng, Yanan Jiang, Chen Tian, Long Cheng, Qun Huang, Weichao Li, Yi Wang, Qianyi Huang, Jiaqi Zheng, Rui Xia, Yi Wang, Wanchun Dou, Guihai Chen:
Rethinking Fine-Grained Measurement From Software-Defined Perspective: A Survey. IEEE Trans. Serv. Comput. 15(6): 3649-3667 (2022) - [j30]Long Cheng, Linghe Kong, Yu Gu, Jianwei Niu, Ting Zhu, Cong Liu, Shahid Mumtaz, Tian He:
Collision-Free Dynamic Convergecast in Low-Duty-Cycle Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 21(3): 1665-1680 (2022) - [c62]Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu, Ziming Zhao:
Understanding and Detecting Remote Infection on Linux-based IoT Devices. AsiaCCS 2022: 873-887 - [c61]Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao, Gail-Joon Ahn:
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks. CODASPY 2022: 65-76 - [c60]Mingqi Li, Fei Ding, Dan Zhang, Long Cheng, Hongxin Hu, Feng Luo:
Multi-level Distillation of Semantic Knowledge for Pre-training Multilingual Language Model. EMNLP 2022: 3097-3106 - [c59]Jim Martin, Manveen Kaur, Long Cheng, Abolfazi Razi:
Towards Connecting the Disconnected Internet. ICCCN 2022: 1-7 - [c58]Ebuka Okpala, Long Cheng, Nicodemus Msafiri John Mbwambo, Feng Luo:
AAEBERT: Debiasing BERT-based Hate Speech Detection Models via Adversarial Learning. ICMLA 2022: 1606-1612 - [c57]John Anderson, Qiqing Huang, Long Cheng, Hongxin Hu:
BYOZ: Protecting BYOD Through Zero Trust Network Security. NAS 2022: 1-8 - [c56]Douglas Everson, Ashish Bastola, Rajat Mittal, Siddheshwar Munde, Long Cheng:
A Comparative Study of Log4Sheil Test Tools. SecDev 2022: 16-22 - [c55]Sisheng Liang, Zihao Zhan, Fan Yao, Long Cheng, Zhenkai Zhang:
Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance. SP (Workshops) 2022: 312-322 - [c54]Jeffrey Young, Song Liao, Long Cheng, Hongxin Hu, Huixing Deng:
SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild. USENIX Security Symposium 2022: 1113-1130 - [i7]Mingqi Li, Fei Ding, Dan Zhang, Long Cheng, Hongxin Hu, Feng Luo:
Multi-level Distillation of Semantic Knowledge for Pre-training Multilingual Language Model. CoRR abs/2211.01200 (2022) - 2021
- [j29]Song Liao, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng:
Problematic Privacy Policies of Voice Assistant Applications. IEEE Secur. Priv. 19(6): 66-73 (2021) - [j28]Yuan Luo, Long Cheng, Hongxin Hu, Guojun Peng, Danfeng Yao:
Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT. IEEE Internet Things J. 8(4): 2736-2750 (2021) - [j27]Long Cheng, Ke Tian, Danfeng Daphne Yao, Lui Sha, Raheem A. Beyah:
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 18(2): 825-842 (2021) - [j26]Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng (Daphne) Yao:
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. ACM Trans. Priv. Secur. 24(4): 26:1-26:36 (2021) - [c53]Shouguo Yang, Long Cheng, Yicheng Zeng, Zhe Lang, Hongsong Zhu, Zhiqiang Shi:
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection. DSN 2021: 224-236 - [c52]Mingqi Li, Song Liao, Ebuka Okpala, Max Tong, Matthew Costello, Long Cheng, Hongxin Hu, Feng Luo:
COVID-HateBERT: a Pre-trained Language Model for COVID-19 related Hate Speech Detection. ICMLA 2021: 233-238 - [c51]Wenbo Ding, Hongxin Hu, Long Cheng:
IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery. NDSS 2021 - [c50]Nishant Vishwamitra, Hongxin Hu, Feng Luo, Long Cheng:
Towards Understanding and Detecting Cyberbullying in Real-world Images. NDSS 2021 - [c49]Salman Ahmed, Long Cheng, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao:
Tutorial: Investigating Advanced Exploits for System Security Assurance. SecDev 2021: 3-4 - [c48]Douglas Everson, Long Cheng:
Compressing Network Attack Surfaces for Practical Security Analysis. SecDev 2021: 23-29 - [i6]Shouguo Yang, Long Cheng, Yicheng Zeng, Zhe Lang, Hongsong Zhu, Zhiqiang Shi:
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection. CoRR abs/2108.06082 (2021) - [i5]Nishant Vishwamitra, Hongxin Hu, Ziming Zhao, Long Cheng, Feng Luo:
Understanding and Measuring Robustness of Multimodal Learning. CoRR abs/2112.12792 (2021) - 2020
- [j25]Junqin Huang, Linghe Kong, Hong-Ning Dai, Weiping Ding, Long Cheng, Guihai Chen, Xi Jin, Peng Zeng:
Blockchain-Based Mobile Crowd Sensing in Industrial Systems. IEEE Trans. Ind. Informatics 16(10): 6553-6563 (2020) - [j24]Long Cheng, Linghe Kong, Yongjia Song, Jianwei Niu, Chengwen Luo, Yu Gu, Shahid Mumtaz, Tian He:
Adaptive Forwarding With Probabilistic Delay Guarantee in Low-Duty-Cycle WSNs. IEEE Trans. Wirel. Commun. 19(7): 4775-4792 (2020) - [c47]Song Liao, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng:
Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications. ACSAC 2020: 856-869 - [c46]Sihan Yu, Xiaonan Zhang, Pei Huang, Linke Guo, Long Cheng, Kuang-Ching Wang:
AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments. AsiaCCS 2020: 20-32 - [c45]Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, Long Cheng, Hai Xiao, Rong Ge:
DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels. AsiaCCS 2020: 33-46 - [c44]Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong, Hongxin Hu:
Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms. CCS 2020: 1699-1716 - [c43]Nishant Vishwamitra, Ruijia (Roger) Hu, Feng Luo, Long Cheng, Matthew Costello, Yin Yang:
On Analyzing COVID-19-related Hate Speech Using BERT Attention. ICMLA 2020: 669-676 - [c42]Douglas Everson, Long Cheng:
Network Attack Surface Simplification for Red and Blue Teams. SecDev 2020: 74-80 - [c41]Xiong Wang, Linghe Kong, Zucheng Wu, Long Cheng, Chenren Xu, Guihai Chen:
SLoRa: towards secure LoRa communications with fine-grained physical layer features. SenSys 2020: 258-270 - [i4]Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng Daphne Yao:
Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities. CoRR abs/2003.13213 (2020) - [i3]Song Liao, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng:
Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications. CoRR abs/2007.14570 (2020)
2010 – 2019
- 2019
- [c40]Junqin Huang, Linghe Kong, Guihai Chen, Long Cheng, Kaishun Wu, Xue Liu:
B-IoT: Blockchain Driven Internet of Things with Credit-Based Consensus Mechanism. ICDCS 2019: 1348-1357 - [c39]Yutong Liu, Linghe Kong, Muhammad Hassan, Long Cheng, Guangtao Xue, Guihai Chen:
Litedge: towards light-weight edge computing for efficient wireless surveillance system. IWQoS 2019: 31:1-31:10 - [c38]Long Cheng, Hans Liljestrand, Md. Salman Ahmed, Thomas Nyman, Trent Jaeger, N. Asokan, Danfeng Yao:
Exploitation Techniques and Defenses for Data-Oriented Attacks. SecDev 2019: 114-128 - [c37]Le Su, Yao Cheng, Huasong Meng, Vrizlynn L. L. Thing, Zhe Wang, Linghe Kong, Long Cheng:
Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation. SmartBlock 2019: 109-119 - [i2]Long Cheng, Hans Liljestrand, Thomas Nyman, Yu Tsung Lee, Danfeng Yao, Trent Jaeger, N. Asokan:
Exploitation Techniques and Defenses for Data-Oriented Attacks. CoRR abs/1902.08359 (2019) - 2018
- [b2]Long Cheng:
Program Anomaly Detection Against Data-Oriented Attacks. Virginia Tech, Blacksburg, VA, USA, 2018 - [j23]Long Cheng, Jianwei Niu, Chengwen Luo, Lei Shu, Linghe Kong, Zhiwei Zhao, Yu Gu:
Towards minimum-delay and energy-efficient flooding in low-duty-cycle wireless sensor networks. Comput. Networks 134: 66-77 (2018) - [j22]Jianqiang Li, Gang Feng, Wei Wei, Chengwen Luo, Long Cheng, Huihui Wang, Houbing Song, Zhong Ming:
PSOTrack: A RFID-Based System for Random Moving Objects Tracking in Unconstrained Indoor Environment. IEEE Internet Things J. 5(6): 4632-4641 (2018) - [j21]Chao Tong, Larry R. Medsker, Long Cheng, Amir Jafari, Xiaojun Wang:
Introduction to the special issue on deep learning for biomedical and healthcare applications. Neural Comput. Appl. 30(7): 2015-2016 (2018) - [j20]Xinglin Zhang, Lingyu Liang, Chengwen Luo, Long Cheng:
Privacy-Preserving Incentive Mechanisms for Mobile Crowdsensing. IEEE Pervasive Comput. 17(3): 47-57 (2018) - [j19]Jung-Hyun Jun, Liang He, Yu Gu, Wenchao Jiang, Gaurav Kushwaha, Vipin A, Long Cheng, Cong Liu, Ting Zhu:
Low-Overhead WiFi Fingerprinting. IEEE Trans. Mob. Comput. 17(3): 590-603 (2018) - [c36]Yutong Liu, Linghe Kong, Yifeng Cao, Vahan Sarafian, Long Cheng, Guihai Chen:
Stop Unauthorized Access to Your Smart Devices. ICPADS 2018: 228-235 - [i1]Long Cheng, Ke Tian, Danfeng Yao, Lui Sha, Raheem A. Beyah:
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. CoRR abs/1805.00074 (2018) - 2017
- [b1]Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo:
Anomaly Detection as a Service: Challenges, Advances, and Opportunities. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017, ISBN 978-3-031-01226-6 - [j18]Long Cheng, Jianwei Niu, Linghe Kong, Chengwen Luo, Yu Gu, Wenbo He, Sajal K. Das:
Compressive sensing based data quality improvement for crowd-sensing applications. J. Netw. Comput. Appl. 77: 123-134 (2017) - [j17]Chengwen Luo, Long Cheng, Hande Hong, Kartik Sankaran, Mun Choon Chan, Jianqiang Li, Zhong Ming:
From mapping to indoor semantic queries: Enabling zero-effort indoor environmental sensing. J. Netw. Comput. Appl. 80: 141-151 (2017) - [j16]Sazzadur Rahaman, Long Cheng, Danfeng Daphne Yao, He Li, Jung-Min "Jerry" Park:
Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation. Proc. Priv. Enhancing Technol. 2017(4): 384-403 (2017) - [j15]Long Cheng, Dinil Mon Divakaran, Aloysius Wooi Kiak Ang, Wee-Yong Lim, Vrizlynn L. L. Thing:
FACT: A Framework for Authentication in Cloud-Based IP Traceback. IEEE Trans. Inf. Forensics Secur. 12(3): 604-616 (2017) - [j14]Chengwen Luo, Long Cheng, Mun Choon Chan, Yu Gu, Jianqiang Li, Zhong Ming:
Pallas: Self-Bootstrapping Fine-Grained Passive Indoor Localization Using WiFi Monitors. IEEE Trans. Mob. Comput. 16(2): 466-481 (2017) - [j13]Long Cheng, Fang Liu, Danfeng (Daphne) Yao:
Enterprise data breach: causes, challenges, prevention, and future directions. WIREs Data Mining Knowl. Discov. 7(5) (2017) - [c35]Long Cheng, Ke Tian, Danfeng (Daphne) Yao:
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks. ACSAC 2017: 315-326 - [c34]Long Cheng, Ke Tian, Danfeng (Daphne) Yao:
POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics. CCS 2017: 2483-2485 - [c33]Hussain M. J. Almohri, Long Cheng, Danfeng Yao, Homa Alemzadeh:
On Threat Modeling and Mitigation of Medical Cyber-Physical Systems. CHASE 2017: 114-119 - [c32]Chaoxi Li, Chengwen Luo, Junliang Chen, Hande Hong, Jianqiang Li, Long Cheng:
LiPS: Learning Social Relationships in Probe Space. PCM (1) 2017: 873-882 - 2016
- [j12]Chengwen Luo, Hande Hong, Long Cheng, Mun Choon Chan, Jianqiang Li, Zhong Ming:
Accuracy-aware wireless indoor localization: Feasibility and applications. J. Netw. Comput. Appl. 62: 128-136 (2016) - [j11]Long Cheng, Jianwei Niu, Mario Di Francesco, Sajal K. Das, Chengwen Luo, Yu Gu:
Seamless Streaming Data Delivery in Cluster-Based Wireless Sensor Networks With Mobile Elements. IEEE Syst. J. 10(2): 805-816 (2016) - [j10]Long Cheng, Dinil Mon Divakaran, Wee-Yong Lim, Vrizlynn L. L. Thing:
Opportunistic Piggyback Marking for IP Traceback. IEEE Trans. Inf. Forensics Secur. 11(2): 273-288 (2016) - [j9]Long Cheng, Jianwei Niu, Yu Gu, Chengwen Luo, Tian He:
Achieving Efficient Reliable Flooding in Low-Duty-Cycle Wireless Sensor Networks. IEEE/ACM Trans. Netw. 24(6): 3676-3689 (2016) - [c31]Long Cheng, Yu Gu, Jianwei Niu, Ting Zhu, Cong Liu, Qingquan Zhang, Tian He:
Taming collisions for delay reduction in low-duty-cycle wireless sensor networks. INFOCOM 2016: 1-9 - 2015
- [j8]Linghe Kong, Xiao-Yang Liu, Meixia Tao, Min-You Wu, Yu Gu, Long Cheng, Jianwei Niu:
Resource-Efficient Data Gathering in Sensor Networks for Environment Reconstruction. Comput. J. 58(6): 1330-1343 (2015) - [c30]Jianwei Niu, Bowei Wang, Long Cheng, Joel J. P. C. Rodrigues:
WicLoc: An indoor localization system based on WiFi fingerprints and crowdsourcing. ICC 2015: 3008-3013 - [c29]Long Cheng, Linghe Kong, Chengwen Luo, Jianwei Niu, Yu Gu, Wenbo He, Sajal K. Das:
Deco: False data detection and correction framework for participatory sensing. IWQoS 2015: 213-218 - [c28]Long Cheng, Jianwei Niu, Yu Gu, Tian He, Qingquan Zhang:
Energy-efficient statistical delay guarantee for duty-cycled wireless sensor networks. SECON 2015: 46-54 - [c27]Chengwen Luo, Hande Hong, Long Cheng, Kartik Sankaran, Mun Choon Chan:
iMap: Automatic inference of indoor semantics exploiting opportunistic smartphone sensing. SECON 2015: 489-497 - 2014
- [j7]Jianwei Niu, Long Cheng, Yu Gu, Lei Shu, Sajal K. Das:
R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Networks. IEEE Trans. Ind. Informatics 10(1): 784-794 (2014) - [j6]Long Cheng, Jianwei Niu, Jiannong Cao, Sajal K. Das, Yu Gu:
QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 25(7): 1864-1875 (2014) - [j5]Yu Gu, Long Cheng, Jianwei Niu, Tian He, David Hung-Chang Du:
Achieving Asymmetric Sensing Coverage for Duty Cycled Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 25(12): 3076-3087 (2014) - [c26]Shaobo Wu, Jianwei Niu, Long Cheng, Wusheng Chou:
Energy efficient flooding under minimum delay constraint in synchronous low-duty-cycle wireless sensor networks. ComComAP 2014: 121-126 - [c25]W. Quin Yow, Xiaoqian Li, Wan-Yu Hung, Megan Goldring, Long Cheng, Yu Gu:
Predicting social networks and psychological outcomes through mobile phone sensing. ICC 2014: 3925-3931 - [c24]Jung-Hyun Jun, Long Cheng, Liang He, Yu Gu, Ting Zhu:
Exploiting Sender-Based Link Correlation in Wireless Sensor Networks. ICNP 2014: 445-455 - 2013
- [j4]Long Cheng, Weiwei Jiao, Min Chen, Canfeng Chen, Jian Ma:
Wait, focus and spray: efficient data delivery in wireless sensor networks with ubiquitous mobile data collectors. Telecommun. Syst. 52(4): 2503-2517 (2013) - [c23]Dexin Ma, Jian Ma, Long Cheng, Pengmin Xu:
A virtual area partition clustering protocol with assistant cluster heads for wireless sensor networks. ICCA 2013: 1387-1390 - [c22]Long Cheng, Yu Gu, Tian He, Jianwei Niu:
Dynamic switching-based reliable flooding in low-duty-cycle wireless sensor networks. INFOCOM 2013: 1393-1401 - [c21]Jung-Hyun Jun, Yu Gu, Long Cheng, Banghui Lu, Jun Sun, Ting Zhu, Jianwei Niu:
Social-Loc: improving indoor localization with social sensing. SenSys 2013: 14:1-14:14 - [c20]Jianwei Niu, Long Cheng, Yu Gu, Jung-Hyun Jun, Qingquan Zhang:
Minimum-delay and energy-efficient flooding tree in asynchronous low-duty-cycle wireless sensor networks. WCNC 2013: 1261-1266 - [c19]Jianwei Niu, Banghui Lu, Long Cheng, Yu Gu, Lei Shu:
ZiLoc: Energy efficient WiFi fingerprint-based localization with low-power radio. WCNC 2013: 4558-4563 - 2012
- [j3]Long Cheng, Canfeng Chen, Jian Ma, Lei Shu:
Contention-based geographic forwarding in asynchronous duty-cycled wireless sensor networks. Int. J. Commun. Syst. 25(12): 1585-1602 (2012) - [c18]Jung-Hyun Jun, Long Cheng, Jun Sun, Yu Gu, Ting Zhu, Tian He:
Improving indoor localization with social interactions. SenSys 2012: 323-324 - [c17]Long Cheng, Yu Gu, Tian He, Jianwei Niu:
Dynamic switching-based reliable flooding in low-duty-cycle wireless sensor networks. SenSys 2012: 351-352 - 2011
- [j2]Long Cheng, Jiannong Cao, Canfeng Chen, Hongyang Chen, Jian Ma:
Towards intelligent contention-based geographic forwarding in wireless sensor networks. IET Commun. 5(12): 1711-1719 (2011) - [c16]Long Cheng, Sajal K. Das, Canfeng Chen, Jian Ma, Wendong Wang:
Robust Forwarding for Reactive Routing Protocols in Wireless Ad Hoc Networks with Unreliable Links. ICC 2011: 1-6 - [c15]Long Cheng, Sajal K. Das, Mario Di Francesco, Canfeng Chen, Jian Ma:
Scalable and Energy-Efficient Broadcasting in Multi-Hop Cluster-Based Wireless Sensor Networks. ICC 2011: 1-5 - [c14]Long Cheng, Sajal K. Das, Mario Di Francesco, Canfeng Chen, Jian Ma, Dongliang Xie:
Streaming data delivery in multi-hop cluster-based wireless sensor networks with mobile sinks. WOWMOM 2011: 1-9 - [c13]Mario Di Francesco, Na Li, Long Cheng, Mayank Raj, Sajal K. Das:
A framework for multimodal sensing in heterogeneous and multimedia wireless sensor networks. WOWMOM 2011: 1-3 - 2010
- [j1]Long Cheng, Yimin Chen, Canfeng Chen, Jian Ma, Lei Shu, Athanasios V. Vasilakos, Naixue Xiong:
Efficient Query-Based Data Collection for Mobile Wireless Monitoring Applications. Comput. J. 53(10): 1643-1657 (2010) - [c12]Weiwei Jiao, Long Cheng, Yimin Chen, Canfeng Chen, Jian Ma:
Efficient Data Delivery in Wireless Sensor Networks with Ubiquitous Mobile Data Collectors. EUC 2010: 232-239 - [c11]Long Cheng, Sajal K. Das, Jiannong Cao, Canfeng Chen, Jian Ma:
Distributed Minimum Transmission Multicast Routing Protocol for Wireless Sensor Networks. ICPP 2010: 188-197 - [c10]Long Cheng, Jiannong Cao, Canfeng Chen, Hongyang Chen, Jian Ma, Joanna Izabela Siebert:
Cooperative contention-based forwarding for wireless sensor networks. IWCMC 2010: 1136-1140 - [c9]Joanna Izabela Siebert, Jiannong Cao, Long Cheng, Edwin Wei, Canfeng Chen, Jian Ma:
Decentralized service composition in pervasive computing environments. IWCMC 2010: 1258-1262 - [c8]Long Cheng, Jiannong Cao, Canfeng Chen, Jian Ma, Sajal K. Das:
Exploiting geographic opportunistic routing for soft QoS provisioning in wireless sensor networks. MASS 2010: 292-301
2000 – 2009
- 2009
- [c7]Long Cheng, Canfeng Chen, Jian Ma, Yimin Chen:
A Group-Level Incentive Scheme for Data Collection in Wireless Sensor Networks. CCNC 2009: 1-5 - [c6]Long Cheng, Canfeng Chen, Jian Ma, Lei Shu, Hongyang Chen, Laurence Tianruo Yang:
Residual Time Aware Forwarding for Randomly Duty-Cycled Wireless Sensor Networks. CSE (2) 2009: 79-86 - [c5]Long Cheng, Yimin Chen, Canfeng Chen, Jian Ma:
Query-based data collection in wireless sensor networks with mobile sinks. IWCMC 2009: 1157-1162 - [c4]Weiwei Jiao, Wenbin Yu, Long Cheng, Canfeng Chen, Jian Ma:
RAML: Range-Boundary Aware Mobility-Assisted Localization Scheme for Wireless Sensor Networks. ScalCom-EmbeddedCom 2009: 63-68 - [c3]Yimin Chen, Long Cheng, Canfeng Chen, Jian Ma:
Wireless Sensor Network for Data Sensing in Intelligent Transportation System. VTC Spring 2009 - [c2]Yimin Chen, Long Cheng, Canfeng Chen, Jian Ma:
Meeting Position Aware Routing for Query-Based Mobile Enabled Wireless Sensor Network. VTC Fall 2009 - 2008
- [c1]Lei Shu, Manfred Hauswirth, Long Cheng, Jian Ma, Vinny Reynolds, Lin Zhang:
Sharing Worldwide Sensor Network. SAINT 2008: 189-192
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint