Follow
Yong Guan
Yong Guan
Verified email at iastate.edu
Title
Cited by
Cited by
Year
Network traffic classification using correlation information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, Y Guan
IEEE Transactions on Parallel and Distributed systems 24 (1), 104-117, 2012
4222012
An efficient signature-based scheme for securing network coding against pollution attacks
Z Yu, Y Wei, B Ramkumar, Y Guan
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1409-1417, 2008
3252008
A dynamic en-route scheme for filtering false data injection in wireless sensor networks
Z Yu, Y Guan
Proceedings of the 3rd international conference on Embedded networked sensor …, 2005
2492005
Lightweight mutual authentication and ownership transfer for RFID systems
L Kulseng, Z Yu, Y Wei, Y Guan
2010 proceedings IEEE infocom, 1-5, 2010
2172010
Detecting black-hole attack in mobile ad hoc networks
B Sun, Y Guan, J Chen, UW Pooch
IET Digital Library, 2003
2132003
Detecting click fraud in pay-per-click streams of online advertising networks
L Zhang, Y Guan
2008 The 28th International Conference on Distributed Computing Systems, 77-84, 2008
2002008
An efficient scheme for securing XOR network coding against pollution attacks
Z Yu, Y Wei, B Ramkumar, Y Guan
IEEE INFOCOM 2009, 406-414, 2009
1642009
A key management scheme using deployment knowledge for wireless sensor networks
Z Yu, Y Guan
IEEE Transactions on Parallel and Distributed Systems 19 (10), 1411-1425, 2008
1352008
A dynamic en-route filtering scheme for data reporting in wireless sensor networks
Z Yu, Y Guan
IEEE/ACM transactions on networking 18 (1), 150-163, 2009
1342009
Netcamo: camouflaging network traffic for qos-guaranteed mission critical applications
Y Guan, X Fu, D Xuan, PU Shenoy, R Bettati, W Zhao
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2001
1332001
A key pre-distribution scheme using deployment knowledge for wireless sensor networks
Z Yu, Y Guan
IPSN 2005. Fourth International Symposium on Information Processing in …, 2005
1062005
An optimal strategy for anonymous communication protocols
Y Guan, X Fu, R Bettati, W Zhao
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
1012002
A robust group-based key management scheme for wireless sensor networks
Z Yu, Y Guan
IEEE Wireless Communications and Networking Conference, 2005 4, 1915-1920, 2005
1002005
Sketch-based streaming PCA algorithm for network-wide traffic anomaly detection
Y Liu, L Zhang, Y Guan
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
822010
Lightweight location verification algorithms for wireless sensor networks
Y Wei, Y Guan
IEEE Transactions on Parallel and Distributed Systems 24 (5), 938-950, 2012
712012
Lightweight secure search protocols for low-cost RFID systems
L Kulseng, Z Yu, Y Wei, Y Guan
2009 29th IEEE International Conference on Distributed Computing Systems, 40-48, 2009
602009
Detection of stepping stone attack under delay and chaff perturbations
L Zhang, AG Persaud, A Johnson, Y Guan
2006 IEEE International Performance Computing and Communications Conference …, 2006
582006
Preventing traffic analysis for real-time communication networks
Y Guan, C Li, D Xuan, R Bettati, W Zhao
MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No …, 1999
531999
Identifying high-cardinality hosts from network-wide traffic measurements
Y Liu, W Chen, Y Guan
IEEE Transactions on Dependable and Secure Computing 13 (5), 547-558, 2015
502015
Location verification algorithms forwireless sensor networks
Y Wei, Z Yu, Y Guan
27th International Conference on Distributed Computing Systems (ICDCS'07), 70-70, 2007
482007
The system can't perform the operation now. Try again later.
Articles 1–20