Follow
Juan CHEN
Juan CHEN
Guangzhou University
Verified email at gzhu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Trust architecture and reputation evaluation for internet of things
J Chen, Z Tian, X Cui, L Yin, X Wang
Journal of Ambient Intelligence and Humanized Computing 10, 3099-3107, 2019
1102019
Continuous indoor positioning fusing WiFi, smartphone sensors and landmarks
ZA Deng, G Wang, D Qin, Z Na, Y Cui, J Chen
Sensors 16 (9), 1427, 2016
552016
A source-location privacy preservation protocol in wireless sensor networks using source-based restricted flooding
J Chen, BX Fang, LH Yin, S Su
Jisuanji Xuebao(Chinese Journal of Computers) 33 (9), 1736-1747, 2010
492010
An efficient anonymous communication protocol for wireless sensor networks
J Chen, X Du, B Fang
Wireless Communications and Mobile Computing 12 (14), 1302-1312, 2012
452012
Hiding the source based on limited flooding for sensor networks
J Chen, Z Lin, Y Hu, B Wang
Sensors 15 (11), 29129-29148, 2015
232015
Towards efficient anonymous communications in sensor networks
J Chen, H Zhang, B Fang, X Du, L Yin, X Yu
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011
142011
Accurate indoor tracking using a mobile phone and non-overlapping camera sensor networks
Q Wang, Y Liu, J Chen
2012 IEEE International Instrumentation and Measurement Technology …, 2012
122012
An efficient and effective localization method for networked disjoint top-view cameras
Y Liu, Q Wang, J Liu, J Chen, T Wark
IEEE Transactions on Instrumentation and Measurement 62 (9), 2526-2537, 2013
112013
Sink location protection protocols based on packet sending rate adjustment
J Chen, Z Lin, Y Liu, Y Hu, X Du
International Journal of Distributed Sensor Networks 12 (1), 6354514, 2016
102016
Designing robust routing protocols to protect base stations in wireless sensor networks
J Chen, H Zhang, X Du, B Fang, L Yan
Wireless Communications and Mobile Computing 14 (17), 1613-1626, 2014
92014
Fast-flux botnet detection based on weighted svm
X Yu, B Zhang, L Kang, J Chen
Information Technology Journal 11 (8), 1048, 2012
62012
Base station location protection in wireless sensor networks: Attacks and defense.
J Chen, H Zhang, X Du, B Fang, Y Liu, H Yu
ICC, 554-559, 2012
52012
Protecting sink location against global traffic monitoring attacker
J Chen, Z Lin, X Du
2016 International Conference on Computing, Networking and Communications …, 2016
32016
An efficient and sustainable self-healing protocol for unattended wireless sensor networks
J Chen, H Zhang, B Fang, X Du, H Yu, X Yu
2012 IEEE Global Communications Conference (GLOBECOM), 5356-5361, 2012
32012
WLAN indoor positioning based on D-LDA feature extraction algorithm
J Yu, Z Deng, X Liu, J Chen, Z Na
International Conference in Communications, Signal Processing, and Systems …, 2017
22017
Towards privacy-preserving location sharing over mobile online social networks
J Chen, S Su, X Wang
IEICE TRANSACTIONS on Information and Systems 102 (1), 133-146, 2019
12019
Enhancing source location protection in wireless sensor networks
J Chen, Z Lin, D Wu, B Wang
Sixth International Conference on Electronics and Information Engineering …, 2015
12015
Semantic surface representation of physical entity in the WEB of things
H Yu, B Fang, X Yu, J Chen
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012
12012
Data Storage Method for Fast Retrieval in IoT
J Chen, L Yin, T Zhang, Y Liu, Z Deng
Communications, Signal Processing, and Systems: Proceedings of the 8th …, 2020
2020
Enhancing the Source Node Security in Wireless Sensor Networks
C Juan, L Zhengkui
CN Patent CN104,811,933 A, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20