Qun Li
Title
Cited by
Cited by
Year
Online power-aware routing in wireless ad-hoc networks
Q Li, J Aslam, D Rus
Proceedings of the 7th annual international conference on Mobile computing …, 2001
1022*2001
A survey of fog computing: concepts, applications and issues
S Yi, C Li, Q Li
Proceedings of the 2015 workshop on mobile big data, 37-42, 2015
9172015
Global clock synchronization in sensor networks
Q Li, D Rus
IEEE Transactions on computers 55 (2), 214-226, 2006
7522006
Fog computing: Platform and applications
S Yi, Z Hao, Z Qin, Q Li
2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies …, 2015
4682015
Sending messages to mobile users in disconnected ad-hoc wireless networks
Q Li, D Rus
Proceedings of the 6th annual international conference on Mobile computing …, 2000
3972000
Distributed algorithms for guiding navigation across a sensor network
Q Li, M De Rosa, D Rus
Proceedings of the 9th annual international conference on Mobile computing …, 2003
3682003
Security and privacy issues of fog computing: A survey
S Yi, Z Qin, Q Li
International conference on wireless algorithms, systems, and applications …, 2015
3122015
Elliptic curve cryptography-based access control in sensor networks
H Wang, B Sheng, Q Li
International Journal of Security and Networks 1 (3-4), 127-137, 2006
2202006
Outlier detection in sensor networks
B Sheng, Q Li, W Mao, W Jin
Proceedings of the 8th ACM international symposium on Mobile ad hoc …, 2007
2152007
IMDGuard: Securing implantable medical devices with the external wearable guardian
F Xu, Z Qin, CC Tan, B Wang, Q Li
2011 Proceedings IEEE INFOCOM, 1862-1870, 2011
2132011
Secure and serverless RFID authentication and search protocols
CC Tan, B Sheng, Q Li
IEEE Transactions on Wireless Communications 7 (4), 1400-1407, 2008
1852008
Efficient implementation of public key cryptosystems on mote sensors (short paper)
H Wang, Q Li
ICICS, 519-528, 2006
1742006
Body sensor network security: an identity-based cryptography approach
CC Tan, H Wang, S Zhong, Q Li
Proceedings of the first ACM conference on Wireless network security, 148-153, 2008
1692008
Verifiable privacy-preserving range query in two-tiered sensor networks
B Sheng, Q Li
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 46-50, 2008
1672008
Counting RFID tags efficiently and anonymously
H Han, B Sheng, CC Tan, Q Li, W Mao, S Lu
2010 Proceedings IEEE INFOCOM, 1-9, 2010
1662010
How to monitor for missing RFID tags
CC Tan, B Sheng, Q Li
2008 The 28th International Conference on Distributed Computing Systems, 295-302, 2008
1562008
Sybildefender: Defend against sybil attacks in large social networks
W Wei, F Xu, CC Tan, Q Li
2012 proceedings ieee infocom, 1951-1959, 2012
1522012
Communication in disconnected ad hoc networks using message relay
Q Li, D Rus
Journal of Parallel and Distributed Computing 63 (1), 75-86, 2003
1512003
ETCH: Efficient Channel Hopping for Communication Rendezvous in Dynamic Spectrum Access Networks
Y Zhang, Q Li, G Yu, B Wang
IEEE Infocom, 2011
1392011
Data storage placement in sensor networks
B Sheng, Q Li, W Mao
Proceedings of the 7th ACM international symposium on Mobile ad hoc …, 2006
1382006
The system can't perform the operation now. Try again later.
Articles 1–20