@article{Li-Node-12,
title={Node Localization through Physical Layer Network Coding: Bootstrap, Security, and Accuracy},
journal={Elsevier Ad Hoc Networks},
volume ={10},
number={7},
pages={1267--1277},
year={2012},
author={Z. Li and W. Wang}
}

@article{Li-Forced-11,
title={Forced Collision: Detecting Wormhole Attacks with Physical Layer Network Coding},
journal={Elsevier Tsinghua Science and Technology, special issue on Wireless Mobile Computing and Networking},
volume={16},
number={ 5},
pages={ 505--519},
year={2011},
author={Z. Li and D. Pu and W. Wang and A. Wyglinski}
}

@article{Yu-3D-11,
title={3D Digital Legos for Teaching Security Protocols},
journal={IEEE Transactions on Learning Technologies (TLT)},
Volume={4},
number={2},
pages={125--137},
year={2011},
author={L. Yu and L. Harrison and A. Lu and Z. Li and W. Wang}
}

@article{Lu-Sybil-11,
title={Sybil Attack Detection through Global Topology Pattern Visualization},
journal={Information Visualization Journal (IVS)},
volume={10},
number={1},
pages={32--46},
year={2011},
author={A. Lu and W. Wang and A. Dynate and X. Hu}
}

@article{Wang-Visua-08,
title={Visualization of Wormholes in Underwater Sensor Networks: A Distributed Approach},
journal={International Journal of Security and Networks (IJSN)},
Volume ={3},
number={1},
pages={10--23},
year={2008},
author={W. Wang and J. Kong and B. Bhargava and M. Gerla}
}

@article{Wang-State-07,
title={Stateless Key Distribution for Secure Intra and Inter-group Multicast in Mobile Wireless Networks},
journal={Elsevier Computer Networks},
volume ={51},
number={15},
pages={4303--4321},
year={2007},
author={W. Wang and T. Stransky}
}

@article{Wang-Inter-07,
title={Interactive Wormhole Detection and Evaluation},
journal={Information Visualization Journal (IVS)},
volume={6},
number={1},
pages={3--17},
year={2007},
author={W. Wang and A. Lu}
}

@article{Evans-Wireless-06,
title={Wireless networking security: open issues in trust, management, interoperation, and measurement},
journal={International Journal of Security and Networks (IJSN)},
volume={1},
number={1/2},
pages={84--94},
year={2006},
author={J. Evans and W. Wang and B. Ewy}
}

@article{Lu-Trust-06,
title={Trust-Based Privacy Preservation for Peer-to-peer Data Sharing},
journal={IEEE Transactions on Systems, Man and Cybernetics (Part A, Systems and Humans)},
volume={36},
number={3},
pages={498--502},
year={2006},
author={Y. Lu and W. Wang and D. Xu and B. Bhargava}
}

@article{Wang-Defend-06,
title={Defending against Wormhole Attacks in Mobile Ad Hoc Networks},
journal={Wireless Communications and Mobile Computing (WCMC)},
volume={6},
number={4},
pages={483--503},
year={2006},
author={W. Wang and B. Bhargava and Y. Lu and X. Wu}
}

@article{Bhargava-Inte-04,
title={Integrating Heterogeneous Wireless Technologies: A Cellular-assisted Mobile Ad Hoc Network},
journal={Kluwer Mobile Networks and Applications (MONET), Special Issue on Integration of Heterogeneous Wireless Technologies},
volume={9},
pages={393--408},
year={2004},
author={B. Bhargava and X. Wu and Y. Lu and W. Wang}
}

@article{Lu-Secure-03,
title={Secure Wireless Network with Movable Base Stations},
journal={IEICE Transactions on Communications, IEICE/IEEE Joint Special Issue on Assurance Systems and Networks},
volume={E86-B},
number={10},
pages={2922--2930},
year={2003},
author={Y. Lu and B. Bhargava and W. Wang and Y. Zhong and X. Wu}
}