Skip to main content

and
  1. No Access

    Reference Work Entry In depth

    Long-Term Quality of Protection

    Wei Wang, Tao Jiang, Qian Zhang in Encyclopedia of Wireless Networks (2020)

  2. No Access

    Reference Work Entry In depth

    Pilot Spoofing Attack

    Wei Wang in Encyclopedia of Wireless Networks (2020)

  3. No Access

    Book

  4. No Access

    Chapter

    Location Privacy Preservation in Database-Driven Cognitive Radio Networks

    Besides spectrum sensing, geo-location database query approach is another typical approach to obtain spectrum availabilities at SU’s location. The database query approach is enforced by the latest FCC’s rule 2...

    Wei Wang, Qian Zhang in Location Privacy Preservation in Cognitive Radio Networks (2014)

  5. No Access

    Chapter

    Location Privacy Preservation in Collaborative Spectrum Sensing

    With the proliferation of mobile devices and the rapid growing of wireless services, cognitive radio networks (CRNs) have been recognized as a promising technology to alleviate the spectrum scarcity problem. T...

    Wei Wang, Qian Zhang in Location Privacy Preservation in Cognitive Radio Networks (2014)

  6. No Access

    Chapter

    Future Research Directions

    Information sharing and transmission is an essential part of SUs in CRNs. Collaborative spectrum sensing requires the sharing of sensing reports between SUs and the FC. In database-driven CRNs, the location in...

    Wei Wang, Qian Zhang in Location Privacy Preservation in Cognitive Radio Networks (2014)

  7. No Access

    Chapter

    Privacy Preservation Techniques

    In this chapter, we will introduce some basic concepts and fundamental knowledge of privacy preservation techniques. Privacy preservation has become a major issue across different applications, from data publi...

    Wei Wang, Qian Zhang in Location Privacy Preservation in Cognitive Radio Networks (2014)

  8. No Access

    Chapter

    Introduction

    The rapid proliferation of wireless technology offers the promise of many societal and individual benefits by enabling pervasive networking and communication via personal devices such as smartphones, PDAs, com...

    Wei Wang, Qian Zhang in Location Privacy Preservation in Cognitive Radio Networks (2014)

  9. No Access

    Article

    On the Accuracy of Packet Delay Estimation in Distributed Service Networks

    Packet delay (either one-way time or round-trip time) is a very important metric for measuring the performance of networks in a highly dynamic environment such as the Internet. Many network applications are al...

    Nafei Zhu, **gsha He, Yue Zhou, Wei Wang in Journal of Network and Systems Management (2013)

  10. No Access

    Chapter and Conference Paper

    Stochastically Consistent Caching and Dynamic Duty Cycling for Erratic Sensor Sources

    We present a novel dynamic duty cycling scheme to maintain stochastic consistency for caches in sensor networks. To reduce transmissions, base stations often maintain caches for erratically changing sensor sou...

    Shanzhong Zhu, Wei Wang, Chinya V. Ravishankar in Distributed Computing in Sensor Systems (2006)

  11. No Access

    Chapter and Conference Paper

    Localized Recursive Estimation in Wireless Sensor Networks

    This paper proposes a localized recursive estimation scheme for parameter estimation in wireless sensor networks. Given any parameter occurred at some location and time, a number of sensors recursively estimat...

    Bang Wang, Kee Chaing Chua, Vikram Srinivasan in Mobile Ad-hoc and Sensor Networks (2005)

  12. No Access

    Chapter and Conference Paper

    Worst and Best Information Exposure Paths in Wireless Sensor Networks

    This paper proposes the concept of information exposure for a point and for a path based on estimation theory. The information exposure of a point is defined as the probability that the absolute value of estim...

    Bang Wang, Kee Chaing Chua, Wei Wang in Mobile Ad-hoc and Sensor Networks (2005)

  13. No Access

    Chapter and Conference Paper

    Efficient Group Key Management for Dynamic Peer Networks

    In dynamic peer networks, how to promote the performance of group key management without sacrificing the desired security is a critical and difficult problem. In this paper, a secure, efficient and distributed...

    Wei Wang, Jianfeng Ma, SangJae Moon in Mobile Ad-hoc and Sensor Networks (2005)