Publication

Magazine Papers and Book Chapters

  1. Yuguang Fang, Xiaoyan Zhu, and Yanchao Zhang, “Securing resource-constrained wireless ad hoc networks,” IEEE Wireless Communications, vol. 16, no. 2, pp. 24-30, April 2009.
  2. Kui Ren, Wenjing Lou, and Yanchao Zhang, “Multi-user broadcast authentication in wireless sensor networks,” chap. 15 in Encyclopedia on Ad Hoc and Ubiquitous Computing, edited by Dharma Agrawal and Bin Xie, World Scientific, 2009.
  3. Yun Zhou, Yuguang Fang, and Yanchao Zhang, “Securing wireless sensor networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 10, no. 3, 3rd Quarter, 2008.
  4. Yun Zhou, Yanchao Zhang, and Yuguang Fang, “A survey on key management in wireless sensor networks: challenges and solutions,” chap. 5 in Resource, Mobility and Security Management in Wireless Networks and Mobile Communications, edited by Y. Zhang, H. Hu, and M. Fujise, pp. 445-476, Auerback Publication, October 2006.
  5. Wenjing Lou, Wei Liu, and Yanchao Zhang, “Performance optimization using multipath routing in mobile ad hoc and wireless sensor networks,” chap. 4 in Combinatorial Optimization in Communication Networks, edited by M. Cheng, Y. Li, and D-Z. Du, pp. 117-146, Springer, March 2006.

Journal Articles

  1. Jinxue Zhang, Rui Zhang, Yanchao Zhang and Guanhua Yan, “The rise of social botnets: Attacks and countermeasures,” IEEE Transactions on Dependable and Secure Computing, accepted, April 2016.
  2. Jinghcao Sun, Rui Zhang, and Yanchao Zhang, “Privacy-preserving spatiotemporal matching for secure device-to-device communications,” IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1048-1060, December 2016.
  3. Jinxue Zhang, Rui Zhang, Jingchao Sun, Yanchao Zhang and Chi Zhang, “TrueTop: A sybil-resilient system for user influence measurement on Twitter,” IEEE/ACM Transactions on Networking, vol. 24, no. 5, pp. 2834-2846, October 2016. 
  4. Jingchao Sun, Rui Zhang, Xiaocong Jin, and Yanchao Zhang, “SecureFind: Secure and privacy-preserving object finding via mobile crowdsourcing,” IEEE Transactions on Wireless Communications, vol. 15, no. 3, pp. 1716-1728, March 2016.
  5. Rui Zhang, Jingchao Sun, Yanchao Zhang and Xiaoxia Huang, “Jamming-resistant secure neighbor discovery in mobile ad hoc networks,” IEEE Transactions on Wireless Communications, vol. 14, no. 10, pp. 5588-5601, October 2015.
  6. Rui Zhang, Jingchao Sun, Yanchao Zhang and Chi Zhang, “Secure spatial top-K query processing via untrusted location-based service providers,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 111-124, January/February 2015.
  7. Xiaocong Jin, Rui Zhang, Jingchao Sun, and Yanchao Zhang, “TIGHT: A geographic routing protocol for cognitive radio mobile ad hoc networks,” IEEE Transactions on Wireless Communications, vol. 13, no. 8, pp. 4670-4681, August 2014.
  8. Rui Zhang, Jing Shi, Yanchao Zhang and Chi Zhang, “Secure top-K query processing in unattended tiered sensor networks,” IEEE Transactions on Vehicular Technology, vol. 63, no. 9, pp. 4681-4693, November 2014.
  9. Rui Zhang, Jing Shi, Yanchao Zhang and Chi Zhang, “Verifiable privacy-preserving aggregation in people-centric urban sensing systems,” IEEE Journal on Selected Areas in Communications (Special Issue on Emerging Technologies in Communications), vol. 31, no. 9, pp. 268-278, September 2013.
  10. Rui Zhang, Jinxue Zhang, Yanchao Zhang Jinyuan Sun, and Guanhua Yan, “Privacy-preserving profile matching for proximity-based mobile social networking,” IEEE Journal on Selected Areas in Communications (Special Issue on Emerging Technologies in Communications), vol. 31, no. 9, pp. 656-668, September 2013.
  11. Rui Zhang, Yanchao Zhang and Kui Ren, “Distributed privacy-preserving access control in sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no.8, pp. 1427–1438, August 2012.
  12. Rui Zhang, Jing Shi, Yanchao Zhang and Jinyuan Sun, “Secure cooperative data storage and query processing in unattended tiered sensor networks,” IEEE Journal on Selected Areas in Communications (Special Issue on Cooperative Networking Challenges and Applications), vol. 30, no. 2, pp. 433–441, February 2012.
  13. Rui Zhang, Yanchao Zhang and Yuguang Fang, “AOS: An anonymous overlay system for mobile ad hoc networks,” ACM Wireless Networks (WINET), vol. 17, no. 4, pp. 843–859, May 2011.
  14. Chi Zhang, Yang Song, Yuguang Fang, and Yanchao Zhang, “On the price of security in large-scale wireless ad hoc networks,” IEEE/ACM Transactions on Networking, vol. 19, no. 2, pp. 319-332, April 2011.
  15. Jing Shi, Rui Zhang, and Yanchao Zhang, “A spatiotemporal approach for secure range queries in tiered sensor networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 1, pp. 264-273, January 2011.
  16. Jinyuan Sun, Chi Zhang, Yanchao Zhang and Yuguang Fang, “SAT: A security architecture achieving anonymity and traceability in wireless mesh networks,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 2, pp. 295-307, March 2011.
  17. Jinyuan Sun, Chi Zhang, Yanchao Zhang and Yuguang Fang, “An identity-based security system for user privacy in vehicular ad hoc networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227-1239, September 2010.
  18. Chi Zhang, Yanchao Zhang and Yuguang Fang, “A coverage inference protocol for wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 9, no. 6, pp. 850-864, June 2010.
  19. Kui Ren, Shucheng Yu, Wenjing Lou, and Yanchao Zhang, “PEACE: A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 2, pp. 203-215, February 2010.
  20. Kui Ren, Wenjing Lou, Shucheng Yu, and Yanchao Zhang, “Multi-user broadcast authentication in wireless sensor networks,” IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp. 4554-4464, October 2009.
  21. Chi Zhang, Yanchao Zhang and Yuguang Fang, “Localized coverage boundary detection for wireless sensor networks,” ACM Wireless Networks (WINET), vol. 15, no. 1, pp. 3-20, January 2009.
  22. Yanchao Zhang and Kui Ren, “On address privacy in mobile ad hoc networks,” ACM Mobile Networks and Applications (MONET), vol. 14, no. 2, pp. 188-197, April 2009.
  23. Wenjing Lou, Wei Liu, Yanchao Zhang and Yuguang Fang, “SPREAD: improving network security by multipath routing in mobile ad hoc networks,” ACM Wireless Networks (WINET), vol. 15, no. 3, pp. 279-294, April 2009.
  24. Kui Ren, Wenjing Lou, and Yanchao Zhang, “LEDS: providing location-aware end-to-end data security in wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 7, no. 5, pp. 585-598, May 2008.
  25. Yanchao Zhang and Yuguang Fang, “A secure authentication and billing architecture for wireless mesh networks,” ACM Wireless Networks (WINET), vol. 13, no. 5, pp. 663-678, October 2007.
  26. Yanchao Zhang Wenjing Lou, Wei Liu, and Yuguang Fang, “A secure incentive protocol for mobile ad hoc networks,” ACM Wireless Networks (WINET), vol. 13, no. 5, pp. 569-582, October 2007.
  27. Yanchao Zhang and Yuguang Fang, “A fine-grained reputation system for reliable service selection in peer-to-peer networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 8, pp. 1134-1145, August 2007.
  28. Yun Zhou, Yanchao Zhang and Yuguang Fang, “Access control in wireless sensor networks,” Ad Hoc Networks (Special Issue on Security in Ad Hoc and Sensor Networks), vol. 5, no. 1, pp. 3-13, January 2007.
  29. Yanchao Zhang Wei Liu, Wenjing Lou, and Yuguang Fang, “Securing mobile ad hoc networks with certificateless public keys,” IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 386-399, October 2006.
  30. Yanchao Zhang and Yuguang Fang, “ARSA: An attack-resilient security architecture for multi-hop wireless mesh networks,” IEEE Journal on Selected Areas in Communications (Special Issue on High-Speed Network Security–Architecture, Algorithms, and Implementation), vol. 24, no. 10, pp. 1916-1928, October 2006.
  31. Yanchao Zhang Wei Liu, Wenjing Lou, and Yuguang Fang, “MASK: anonymous on-demand routing in mobile ad hoc networks,” IEEE Transactions on Wireless Communications, vol. 5, no. 9, pp. 2376-2385, September 2006.
  32. Wei Liu, Yanchao Zhang Wenjing Lou, and Yuguang Fang, “A robust and energy-efficient data dissemination framework for wireless sensor networks,” ACM Wireless Networks (WINET), vol. 12, no. 4, pp. 465-479, August 2006.
  33. Yanchao Zhang Wei Liu, Yuguang Fang, and Dapeng Wu, “Secure localization and authentication in ultra-wideband sensor networks,” IEEE Journal on Selected Areas in Communications (Special Issue on Ultra Wideband Wireless Communications–Theory and Applications), vol. 24, no. 4, pp. 829-835, April 2006.
  34. Yanchao Zhang Wei Liu, Wenjing Lou, and Yuguang Fang, “Location-based compromise-tolerant security mechanisms for wireless sensor networks,” IEEE Journal on Selected Areas in Communications (Special Issue on Security in Wireless Ad Hoc Networks), vol. 24, no. 2, pp. 247-260, February 2006.
  35. Wei Liu, Yanchao Zhang Kejie Lu, and Yuguang Fang, “Energy conservation through resource-aware movement in heterogeneous mobile ad hoc networks,” Journal of Combinatorial Optimization (Special Issue on Wireless Network Applications), vol. 11, no. 1, pp. 7-20, February 2006.

Conference Papers

  1. Yimin Chen, Jingchao Sun, Xiaocong Jin, Tao Li, Rui Zhang, and Yanchao Zhang, “Your face your heart: Secure mobile face authentication with photoplethysmograms,” IEEE International Conference on Computer Communications (INFOCOM’17), Atlanta, GA, April 2017.
  2. Yimin Chen, Xiaocong Jin, Jingchao Sun, Rui Zhang, and Yanchao Zhang, “POWERFUL: Mobile app fingerprinting via power analysis,” IEEE International Conference on Computer Communications (INFOCOM’17), Atlanta, GA, April 2017.
  3. Xin Yao, Rui Zhang, Yanchao Zhang, and Yaping Lin, “Verifiable social data outsourcing,” IEEE International Conference on Computer Communications (INFOCOM’17), Atlanta, GA, April 2017.
  4. Tao Li, Yimin Chen, Jingchao Sun, Xiaocong Jin, and Yanchao Zhang, “iLock: Immediate and automatic locking of mobile devices against data theft,” ACM Conference on Computer and Communications Security (CCS’16), Vienna, Austria, October 2016.
  5. Xiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, and Yanchao Zhang, “DPSense: Differentially private crowdsourced spectrum sensing,” ACM Conference on Computer and Communications Security (CCS’16), Vienna, Austria, October 2016.
  6. Tao Li, Rui Zhang, and Yanchao Zhang, “PriExpress: Privacy-Preserving Express Delivery with Fine-Grained Attribute-Based Access Control,” IEEE Conference on Communications and Network Security (CNS’16), Philadelphia, PA, October 2016.
  7. Xin Yao, Yaping Lin, Qin Liu, and Yanchao Zhang, “A secure hierarchical deduplication system in cloud storage,” IEEE/ACM International Symposium on Quality of Service (IWQoS’16), Beijing, China, June 2016.
  8. Jinxue Zhang, Xia Hu, Yanchao Zhang, and Huan Liu, “Your age is no secret: Inferring microbloggers’ ages via content and interaction analysis,” International AAAI Conference on Web and Social Media (ICWSM’16), Cologne, Germany, May 2016.
  9. Xiaocong Jin and Yanchao Zhang, “Privacy-preserving crowdsourced spectrum sensing,” IEEE International Conference on Computer Communications (INFOCOM’16), San Francisco, CA, April 2016.
  10. Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang, “PriStream: Privacy-preserving distributed stream monitoring of thresholded percentile statistics,” IEEE International Conference on Computer Communications (INFOCOM’16), San Francisco, CA, China, April 2016.
  11. Wenxin Chen, Mengjun Liu, Rui Zhang, Yanchao Zhang, and Shubo Liu, “Secure outsourced skyline query processing via untrusted cloud service providers,” IEEE International Conference on Computer Communications (INFOCOM’16), San Francisco, April 2016.
  12. Jingchao Sun, Xiaocong Jin, Yimin Chen, Jingxue Zhang, Rui Zhang, and Yanchao Zhang, “VISIBLE: Video-assisted keystroke inference from tablet backside motion,” ISOC Network and Distributed System Security Symposium (NDSS’16), San Diego, California, February 2016.
  13. Xiaocong Jin, Jingchao Sun, Rui Zhang, and Yanchao Zhang, “SafeDSA: Safeguard dynamic spectrum access against fake secondary users,” ACM Conference on Computer and Communications Security (CCS’15), Denver, Colorado, October 2015.
  14. Jinxue Zhang, Jingchao Sun, Rui Zhang, and Yanchao Zhang, “Your actions tell where you are: Uncovering Twitter users in a metropolitan area,” IEEE Conference on Communications and Network Security (CNS’15), Florence, Italy, September 2015.
  15. Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Chi Zhang, “SpecGuard: Spectrum misuse detection in dynamic spectrum access systems,” IEEE International Conference on Computer Communications (INFOCOM’15), Hong Kong, China, April 2015.
  16. Yimin Chen, Jingchao Sun, Rui Zhang, and Yanchao Zhang, “Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices,” IEEE International Conference on Computer Communications (INFOCOM’15), Hong Kong, China, April 2015.
  17. Jingchao Sun, Rui Zhang, Jinxue Zhang, and Yanchao Zhang, “TouchIn: Sightless two-factor authentication on multi-touch mobile devices,” IEEE Conference on Communication and Network Security (CNS’14), San Francisco, CA, October 2014.
  18. Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan Zhang, “SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks,” IEEE International Conference on Computer Communications (INFOCOM’14), Toronto, Canada, April 2014.
  19. Jinxue Zhang, Rui Zhang, Yanchao Zhang, and Guanhua Yan, “On the impact of social botnets for spam distribution and digital-influence manipulation,” IEEE Conference on Communications and Network Security (CNS’13), Washington, D.C., October 2013.
  20. Xia Hu, Jiliang Tang, Yanchao Zhang, and Huan Liu, “Social spammer detection in microblogging,” International Joint Conference on Artificial Intelligence (IJCAI’13), Beijing, China, August 2013.
  21. Rui Zhang, Jinxue Zhang, Yanchao Zhang, and Chi Zhang, “Secure crowdsourcing-based cooperative spectrum sensing,” IEEE International Conference on Computer Communications (INFOCOM’13), Turin, Italy, April 2013.
  22. Jingchao Sun, Rui Zhang, and Yanchao Zhang, “Privacy-preserving spatiotemporal matching,” IEEE International Conference on Computer Communications (INFOCOM’13), Turin, Italy, April 2013.
  23. Rui Zhang, Yanchao Zhang, and Chi Zhang, “Secure top-k query processing via untrusted location-based service providers,” IEEE International Conference on Computer Communication (INFOCOM’12), Orlando, FL, March 2012.
  24. Rui Zhang, Yanchao Zhang, Jinyuan Sun, and Guanhua Yan, “Fine-grained private matching for proximity-based mobile social networking,” IEEE International Conference on Computer Communication (INFOCOM’12), Orlando, FL, March 2012.
  25. Rui Zhang and Yanchao Zhang, “LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks,” International Conference on Distributed Computing Systems (ICDCS’11), Minneapolis, Minnesota, June 2011.
  26. Rui Zhang, Yanchao Zhang, and Xiaoxia Huang, “JR-SND: Jamming-resilient secure neighbor discovery in mobile ad hoc networks,” International Conference on Distributed Computing Systems (ICDCS’11), Minneapolis, Minnesota, June 2011.
  27. Rui Zhang, Yunzhong Liu, Yanchao Zhang, and Jinyuan Sun, “Fast identification of the missing tags in a large RFID system,” IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’11), Salt Lake City, Utah, June 2011.
  28. Yunzhong Liu, Rui Zhang, Jing Shi, and Yanchao Zhang, “Traffic inference in anonymous MANETs,” IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’10), Boston, MA, June 2010.
  29. Rui Zhang and Yanchao Zhang, “Wormhole-resilient secure neighbor discovery in underwater acoustic networks,” IEEE International Conference on Computer Communications (INFOCOM’10), San Diego, CA, March 2010.
  30. Rui Zhang, Jing Shi, Yunzhong Liu, and Yanchao Zhang, “Verifiable fine-grained top-k queries in tiered sensor networks,” IEEE International Conference on Computer Communications (INFOCOM’10), San Diego, CA, March 2010.
  31. Jing Shi, Rui Zhang, Yunzhong Liu, and Yanchao Zhang, “PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems,” IEEE International Conference on Computer Communications (INFOCOM’10), San Diego, CA, March 2010.
  32. Rui Zhang, Jing Shi, and Yanchao Zhang, “Secure multidimensional range queries in sensor networks,” ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’09), New Orleans, LA, May 2009.
  33. Jing Shi, Rui Zhang, and Yanchao Zhang, “Secure range queries in tiered sensor networks,” IEEE International Conference on Computer Communications (INFOCOM’09), Rio de Janeiro, Brazil, April 2009.
  34. Rui Zhang, Yanchao Zhang, and Kui Ren, “DP^2AC: Distributed privacy-preserving access control in sensor networks,” IEEE International Conference on Computer Communications (INFOCOM’09), Rio de Janeiro, Brazil, April 2009.
  35. Qian Wang, Kui Ren, Wenjing Lou, andYanchao Zhang, “Dependable and secure sensor data storage with dynamic integrity assurance,” IEEE International Conference on Computer Communications (INFOCOM’09), Rio de Janeiro, Brazil, April 2009.
  36. Qian Wang, Kui Ren, Yanchao Zhang, and Bo Zhu, “Opportunistic cooperation with receiver-based ratio combining strategy,” International Conference on Wireless Algorithms, Systems and Applications (WASA’08), Dallas, TX, USA, October 2008.
  37. Kai Zeng, Shucheng Yu, Kui Ren, Wenjing Lou, and Yanchao Zhang, “Towards secure link quality measurement in multihop wireless networks,” IEEE Global Telecommunications Conference (GLOBECOM’08), New Orleans, LA, USA, November 2008.
  38. Yanchao Zhang and Kui Ren, “Towards address privacy in mobile ad hoc networks,” International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine’08), Hong Kong, SAR, China, August 2008.
  39. Wei Ren, Kui Ren, Wenjing Lou, and Yanchao Zhang, “Efficient user revocation for privacy-aware PKI,” International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine’08), Hong Kong, SAR, China, August 2008.
  40. Yang Song, Yuguang Fang, and Yanchao Zhang, “Stochastic channel selection in cognitive radio networks,” IEEE Global Communications Conference (GLOBECOM’07), Washington, DC, November 2007.
  41. Kai Zeng, Wenjing Lou, and Yanchao Zhang, “Multi-rate geographic opportunistic routing in wireless ad hoc networks,” IEEE Military Communications Conference (MILCOM’07), Orlando, FL, October 2007.
  42. Kui Ren, Wenjing Lou, and Yanchao Zhang, “Multi-user broadcast authentication in wireless sensor networks,” IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’07), San Diego, June 2007.
  43. Yuguang Fang and Yanchao Zhang, “Securing resource-constrained wireless ad hoc networks,” IEEE Sarnoff Symposium (invited), Princeton, NJ, April 2007.
  44. Chi Zhang, Yanchao Zhang, Yuguang Fang, “Energy-efficient coverage measurement for wireless sensor networks,” IEEE Global Communications Conference (GLOBECOM’06), San Francisco, CA, November 2006.
  45. Chi Zhang, Yanchao Zhang, and Yuguang Fang, “Defending against physical destruction attacks on wireless sensor networks,” IEEE Military Communications Conference (MILCOM’06), Washington, D.C., October 2006.
  46. Chi Zhang, Yanchao Zhang, and Yuguang Fang, “Localized coverage boundary detection for wireless sensor networks,” International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine’06), Waterloo, Ontario, Canada, August 2006.
  47. Kui Ren, Wenjing Lou, and Yanchao Zhang, “LEDS: Providing location-aware end-to-end data security in wireless sensor networks,” IEEE International Conference on Computer Communications (INFOCOM’06), Barcelona, Spain, April 2006.
  48. Chi Zhang, Yanchao Zhang, and Yuguang Fang, “Detecting coverage boundary nodes in wireless sensor networks,” IEEE International Conference On Networking, Sensing and Control, Ft. Lauderdale, Florida, April 2006.
  49. Wei Liu, Yanchao Zhang, and Yuguang Fang, “Conserve energy through multiple-packet transmission in heterogeneous mobile ad hoc networks,” IEEE Military Communications Conference (MILCOM’05), Atlantic City, New Jersey, October 2005.
  50. Yun Zhou, Yanchao Zhang, and Yuguang Fang, “Key establishment in sensor networks based on triangle grid deployment model,” IEEE Military Communications Conference (MILCOM’05), Atlantic City, New Jersey, October 2005.
  51. Yanchao Zhang, Wei Liu, and Yuguang Fang, “Secure localization in wireless sensor networks,” IEEE Military Communications Conference (MILCOM’05), Atlantic City, New Jersey, October 2005.
  52. Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang, and Younggoo Kwon, “AC-PKI: Anonymous and certificateless public key infrastructure for mobile ad hoc networks,” IEEE International Conference on Communications, (ICC’05), Seoul, Korea, May 2005.
  53. Yanchao Zhang, Wei Liu, and Wenjing Lou, “Anonymous communications in mobile ad hoc networks,” IEEE International Conference on Computer Communications (INFOCOM’05), Miami, Florida, March 2005.
  54. Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, “Securing sensor networks with location-based keys,” IEEE Wireless Communications and Networking Conference (WCNC’05), New Orleans, Louisiana, March 2005.
  55. Yun Zhou, Yanchao Zhang, and Yuguang Fang, “LLK: A link-layer key establishment scheme in wireless sensor networks,” IEEE Wireless Communications and Networking Conference (WCNC’05), New Orleans, Louisiana, March 2005.
  56. Wei Liu, Yanchao Zhang, Wenjing Lou, and Yuguang Fang, “Scalable and robust data dissemination in wireless sensor networks,” IEEE Global Communications Conference (GLOBECOM’04), Dallas, Texas, November 2004.
  57. Wei Liu, Yanchao Zhang, Wenjing Lou, and Yuguang Fang, “DELAR: Device/energy/load aware relaying in heterogeneous wireless ad hoc networks,” IEEE Military Communications Conference (MILCOM’04), Monterey, California, November 2004.
  58. Yanchao Zhang, Wei Liu, Wenjing Lou, and Yuguang Fang, “Anonymous handshakes in mobile ad hoc networks,” IEEE Military Communications Conference (MILCOM’04), Monterey, California, November 2004.
  59. Wei Liu, Yanchao Zhang, Wenjing Lou, and Yuguang Fang, “Managing wireless sensor networks with supply chain strategy,” International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine’04), Dallas, Texas, October 2004.
  60. Yanchao Zhang, Wenjing Lou, and Yuguang Fang, “SIP: A secure incentive protocol against selfishness in mobile ad hoc networks,” IEEE Wireless Communications and Networking Conference (WCNC’04), Atlanta, Georgia, March 2004.