Follow
Honglong Chen 陈鸿龙
Title
Cited by
Cited by
Year
Privacy-preserving crowd-sourced statistical data publishing with an untrusted server
Z Wang, X Pang, Y Chen, H Shao, Q Wang, L Wu, H Chen, H Qi
IEEE Transactions on Mobile Computing, 2018
1002018
On Protecting End-to-End Location Privacy against Local Eavesdropper in Wireless Sensor Networks
H Chen, W Lou
Elsevier Pervasive and Mobile Computing, 2015
892015
Achieving Location Error Tolerant Barrier Coverage for Wireless Sensor Networks
Z Wang, H Chen, Q Cao, H Qi, Z Wang, Q Wang.
Computer Networks, 2016
672016
Securing DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
H Chen, W Lou, J Wu, Z Wang, A Xia
Elsevier Pervasive and Mobile Computing, 2015
662015
From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks
H Chen, W Lou
International Performance Computing and Communications Conference, 1-8, 2010
662010
Cost-Effective Barrier Coverage Formation in Heterogeneous Wireless Sensor Networks
Z Wang, Q Cao, H Qi, H Chen, Q Wang
Ad Hoc Networks, 2017
642017
A novel mobility management scheme for target tracking in cluster-based sensor networks
Z Wang, W Lou, Z Wang, J Ma, H Chen
International Conference on Distributed Computing in Sensor Systems, 172-186, 2010
642010
Narrowband Internet of Things systems with opportunistic D2D communication
Y Li, K Chi, H Chen, Z Wang, Y Zhu
IEEE Internet of Things Journal 5 (3), 1474-1484, 2017
592017
A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks
Z Wang, W Lou, Z Wang, J Ma, H Chen
International Journal of Distributed Sensor Networks 2013, 2013
562013
A secure localization approach against wormhole attacks using distance consistency
H Chen, W Lou, X Sun, Z Wang
EURASIP Journal on Wireless Communications and Networking 2010 (1), 1, 2010
532010
Label-based DV-Hop localization against wormhole attacks in wireless sensor networks
J Wu, H Chen, W Lou, Z Wang, Z Wang
2010 IEEE Fifth International Conference on Networking, Architecture, and …, 2010
472010
Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems with Unknown Tags
H Chen, G Xue, Z Wang
IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2017.2664810, 2017
462017
Contact expectation based routing for delay tolerant networks
H Chen, W Lou
Ad Hoc Networks 36, 244-257, 2016
462016
Fault Tolerant Barrier Coverage for Wireless Sensor Networks
Z Wang, H Chen, Q Cao, H Qi, Z Wang
IEEE International Conference on Computer Communications (IEEE INFOCOM 2014), 2014
452014
Conflicting-set-based wormhole attack resistant localization in wireless sensor networks
H Chen, W Lou, Z Wang
International Conference on Ubiquitous Intelligence and Computing, 296-309, 2009
432009
A social-based watchdog system to detect selfish nodes in opportunistic mobile networks
B Jedari, F Xia, H Chen, SK Das, A Tolba, ALM Zafer
Future Generation Computer Systems 92, 777-788, 2019
422019
GAR: Group Aware Cooperative Routing Protocol for Resource- Constraint Opportunistic Networks
H Chen, W Lou
Elsevier Computer Communications, 2014
412014
CRPD: a novel clustering routing protocol for dynamic wireless sensor networks
S Wang, J Yu, M Atiquzzaman, H Chen, L Ni
Personal and Ubiquitous Computing 22 (3), 545-559, 2018
402018
Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems
H Chen, Z Wang, F Xia, Y Li, L Shi
IEEE Internet of Things Journal, 2017
362017
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs
H Chen, W Lou, Z Wang, Q Wang
IEEE Transactions on Vehicular Technology 65 (8), 6377-6388, 2016
342016
The system can't perform the operation now. Try again later.
Articles 1–20