Follow
Yuan Xue
Title
Cited by
Cited by
Year
Optimal resource allocation in wireless ad hoc networks: A price-based approach
Y Xue, B Li, K Nahrstedt
IEEE transactions on mobile computing 5 (4), 347-364, 2006
3122006
On setting TCP's congestion window limit in mobile ad hoc networks
K Chen, Y Xue, K Nahrstedt
IEEE International Conference on Communications, 2003. ICC'03. 2, 1080-1084, 2003
2952003
A scalable location management scheme in mobile ad-hoc networks
Y Xue, B Li, K Nahrstedt
Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks …, 2001
2442001
Understanding bandwidth-delay product in mobile ad hoc networks
K Chen, Y Xue, SH Shah, K Nahrstedt
Computer Communications 27 (10), 923-934, 2004
1852004
Maximizing lifetime for data aggregation in wireless sensor networks
Y Xue, Y Cui, K Nahrstedt
Mobile networks and applications 10, 853-864, 2005
1782005
CareNet: an integrated wireless sensor networking environment for remote healthcare
S Jiang, Y Cao, S Iyengar, P Kuryloski, R Jafari, Y Xue, R Bajcsy, ...
3rd international ICST conference on body area networks, 2010
1642010
Providing fault-tolerant ad hoc routing service in adversarial environments
Y Xue, K Nahrstedt
Wireless Personal Communications 29, 367-388, 2004
1592004
Price-based resource allocation in wireless ad hoc networks
Y Xue, B Li, K Nahrstedt
International Workshop on Quality of Service, 79-96, 2003
1512003
Taxonomy for description of cross-domain attacks on CPS
M Yampolskiy, P Horvath, XD Koutsoukos, Y Xue, J Sztipanovits
Proceedings of the 2nd ACM international conference on High confidence …, 2013
1482013
A location-aided power-aware routing protocol in mobile ad hoc networks
Y Xue, B Li
GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270 …, 2001
1452001
Optimal resource allocation in overlay multicast
Y Cui, Y Xue, K Nahrstedt
IEEE Transactions on Parallel and Distributed Systems 17 (8), 808-823, 2006
1202006
A survey on server-side approaches to securing web applications
X Li, Y Xue
ACM Computing Surveys (CSUR) 46 (4), 1-29, 2014
1142014
Composite bloom filters for secure record linkage
EA Durham, M Kantarcioglu, Y Xue, C Toth, M Kuzu, B Malin
IEEE transactions on knowledge and data engineering 26 (12), 2956-2968, 2013
1132013
Quantifying the correctness, computational complexity, and security of privacy-preserving string comparators for record linkage
E Durham, Y Xue, M Kantarcioglu, B Malin
Information Fusion 13 (4), 245-259, 2012
932012
A language for describing attacks on cyber-physical systems
M Yampolskiy, P Horváth, XD Koutsoukos, Y Xue, J Sztipanovits
International Journal of Critical Infrastructure Protection 8, 40-52, 2015
852015
A utility-based distributed maximum lifetime routing algorithm for wireless networks
Y Xue, Y Cui, K Nahrstedt
Second International Conference on Quality of Service in Heterogeneous Wired …, 2005
842005
Locality-awareness in BitTorrent-like P2P applications
B Liu, Y Cui, Y Lu, Y Xue
IEEE transactions on multimedia 11 (3), 361-371, 2009
782009
Block: a black-box approach for detection of state violation attacks towards web applications
X Li, Y Xue
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
772011
Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach
M Yampolskiy, P Horvath, XD Koutsoukos, Y Xue, J Sztipanovits
2012 5th International Symposium on Resilient Control Systems, 55-62, 2012
732012
A survey on web application security
X Li, Y Xue
Nashville, TN USA 25 (5), 1-14, 2011
712011
The system can't perform the operation now. Try again later.
Articles 1–20