Wei Zhao
Cited by
Cited by
A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications
J Lin, W Yu, N Zhang, X Yang, H Zhang, W Zhao
IEEE Internet of Things Journal 4 (5), 1125-1142, 2017
Mobile communications handbook
JD Gibson
CRC press, 2012
Algorithms for scheduling imprecise computations
JWS Liu, KJ Lin, WK Shih, AC Yu, JY Chung, W Zhao
Foundations of Real-Time Computing: Scheduling and Resource Management, 203-249, 1991
Distributed scheduling of tasks with deadlines and resource requirements
K Ramamritham, JA Stankovic, W Zhao
IEEE Transactions on Computers 38 (8), 1110-1123, 1989
On false data-injection attacks against power system state estimation: Modeling and countermeasures
Q Yang, J Yang, W Yu, D An, N Zhang, W Zhao
IEEE Transactions on Parallel and Distributed Systems 25 (3), 717-729, 2013
Preemptive scheduling under time and resource constraints
W Zhao, K Ramamritham, JA Stankovic
IEEE Transactions on computers 100 (8), 949-960, 1987
Scheduling tasks with resource requirements in hard real-time systems
W Zhao, K Ramamritham, JA Stankovic
IEEE transactions on software engineering, 564-577, 1987
A Survey on Big Data Market: Pricing, Trading and Protection
F Liang, W Yu, D An, Q Yang, X Fu, W Zhao
IEEE Access 6, 15132-15154, 2018
DSSS-based flow marking technique for invisible traceback
W Yu, X Fu, S Graham, D Xuan, W Zhao
2007 IEEE Symposium on Security and Privacy (SP'07), 18-32, 2007
On flow correlation attacks and countermeasures in mix networks
Y Zhu, X Fu, B Graham, R Bettati, W Zhao
Privacy Enhancing Technologies: 4th International Workshop, PET 2004 …, 2005
Guaranteeing synchronous message deadlines with the timed token medium access control protocol
G Agrawal, B Chen, W Zhao, S Davari
IEEE transactions on Computers 43 (3), 327-339, 1994
Migration modeling and learning algorithms for containers in fog computing
Z Tang, X Zhou, F Zhang, W Jia, W Zhao
IEEE Transactions on Services Computing 12 (5), 712-725, 2018
Hard real-time communication in multiple-access networks
N Malcolm, W Zhao
Real-Time Systems 8 (1), 35-77, 1995
Protection of query privacy for continuous location based services
A Pingley, N Zhang, X Fu, HA Choi, S Subramaniam, W Zhao
2011 Proceedings IEEE INFOCOM, 1710-1718, 2011
Virtual time CSMA protocols for hard real-time communication
W Zhao, K Ramamritham
IEEE Transactions on Software Engineering, 938-952, 1987
The timed-token protocol for real-time communications
N Malcolm, W Zhao
Computer 27 (1), 35-41, 1994
On false data injection attacks against distributed energy routing in smart grid
J Lin, W Yu, X Yang, G Xu, W Zhao
2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 183-192, 2012
Guaranteeing synchronous message deadlines with the timed token protocol
G Agrawal, B Chen, W Zhao, S Davari
[1992] Proceedings of the 12th International Conference on Distributed …, 1992
On real-time transactions
JA Stankovic, W Zhao
ACM Sigmod Record 17 (1), 4-18, 1988
A window protocol for transmission of time-constrained messages
W Zhao, JA Stankovic, K Ramamritham
IEEE Transactions on computers 39 (9), 1186-1203, 1990
The system can't perform the operation now. Try again later.
Articles 1–20