Follow
Wei Zhao
Title
Cited by
Cited by
Year
A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications
J Lin, W Yu, N Zhang, X Yang, H Zhang, W Zhao
IEEE Internet of Things Journal 4 (5), 1125-1142, 2017
32132017
Mobile communications handbook
JD Gibson
CRC press, 2012
12192012
Algorithms for scheduling imprecise computations
JWS Liu, KJ Lin, WK Shih, AC Yu, JY Chung, W Zhao
Foundations of Real-Time Computing: Scheduling and Resource Management, 203-249, 1991
8341991
Distributed scheduling of tasks with deadlines and resource requirements
K Ramamritham, JA Stankovic, W Zhao
IEEE Transactions on Computers 38 (8), 1110-1123, 1989
5221989
On false data-injection attacks against power system state estimation: Modeling and countermeasures
Q Yang, J Yang, W Yu, D An, N Zhang, W Zhao
IEEE Transactions on Parallel and Distributed Systems 25 (3), 717-729, 2013
4672013
Preemptive scheduling under time and resource constraints
W Zhao, K Ramamritham, JA Stankovic
IEEE Transactions on computers 100 (8), 949-960, 1987
3781987
A Survey on Big Data Market: Pricing, Trading and Protection
F Liang, W Yu, D An, Q Yang, X Fu, W Zhao
IEEE Access 6, 15132-15154, 2018
3702018
Scheduling tasks with resource requirements in hard real-time systems
W Zhao, K Ramamritham, JA Stankovic
IEEE transactions on software engineering, 564-577, 1987
3681987
DSSS-based flow marking technique for invisible traceback
W Yu, X Fu, S Graham, D Xuan, W Zhao
2007 IEEE Symposium on Security and Privacy (SP'07), 18-32, 2007
2652007
On flow correlation attacks and countermeasures in mix networks
Y Zhu, X Fu, B Graham, R Bettati, W Zhao
Privacy Enhancing Technologies: 4th International Workshop, PET 2004 …, 2005
2452005
Migration modeling and learning algorithms for containers in fog computing
Z Tang, X Zhou, F Zhang, W Jia, W Zhao
IEEE Transactions on Services Computing 12 (5), 712-725, 2018
2412018
Guaranteeing synchronous message deadlines with the timed token medium access control protocol
G Agrawal, B Chen, W Zhao, S Davari
IEEE transactions on Computers 43 (3), 327-339, 1994
2231994
Protection of query privacy for continuous location based services
A Pingley, N Zhang, X Fu, HA Choi, S Subramaniam, W Zhao
2011 Proceedings IEEE INFOCOM, 1710-1718, 2011
2052011
Hard real-time communication in multiple-access networks
N Malcolm, W Zhao
Real-Time Systems 8 (1), 35-77, 1995
2041995
Virtual time CSMA protocols for hard real-time communication
W Zhao, K Ramamritham
IEEE Transactions on Software Engineering, 938-952, 1987
2001987
On false data injection attacks against distributed energy routing in smart grid
J Lin, W Yu, X Yang, G Xu, W Zhao
2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 183-192, 2012
1942012
The timed-token protocol for real-time communications
N Malcolm, W Zhao
Computer 27 (1), 35-41, 1994
1931994
Guaranteeing synchronous message deadlines with the timed token protocol
G Agrawal, B Chen, W Zhao, S Davari
[1992] Proceedings of the 12th International Conference on Distributed …, 1992
1821992
On real-time transactions
JA Stankovic, W Zhao
ACM Sigmod Record 17 (1), 4-18, 1988
1691988
On optimal PMU placement-based defense against data integrity attacks in smart grid
Q Yang, D An, R Min, W Yu, X Yang, W Zhao
IEEE Transactions on Information Forensics and Security 12 (7), 1735-1750, 2017
1672017
The system can't perform the operation now. Try again later.
Articles 1–20