@article{Li-Node-12, title={Node Localization through Physical Layer Network Coding: Bootstrap, Security, and Accuracy}, journal={Elsevier Ad Hoc Networks}, volume ={10}, number={7}, pages={1267--1277}, year={2012}, author={Z. Li and W. Wang} } @article{Li-Forced-11, title={Forced Collision: Detecting Wormhole Attacks with Physical Layer Network Coding}, journal={Elsevier Tsinghua Science and Technology, special issue on Wireless Mobile Computing and Networking}, volume={16}, number={ 5}, pages={ 505--519}, year={2011}, author={Z. Li and D. Pu and W. Wang and A. Wyglinski} } @article{Yu-3D-11, title={3D Digital Legos for Teaching Security Protocols}, journal={IEEE Transactions on Learning Technologies (TLT)}, Volume={4}, number={2}, pages={125--137}, year={2011}, author={L. Yu and L. Harrison and A. Lu and Z. Li and W. Wang} } @article{Lu-Sybil-11, title={Sybil Attack Detection through Global Topology Pattern Visualization}, journal={Information Visualization Journal (IVS)}, volume={10}, number={1}, pages={32--46}, year={2011}, author={A. Lu and W. Wang and A. Dynate and X. Hu} } @article{Wang-Visua-08, title={Visualization of Wormholes in Underwater Sensor Networks: A Distributed Approach}, journal={International Journal of Security and Networks (IJSN)}, Volume ={3}, number={1}, pages={10--23}, year={2008}, author={W. Wang and J. Kong and B. Bhargava and M. Gerla} } @article{Wang-State-07, title={Stateless Key Distribution for Secure Intra and Inter-group Multicast in Mobile Wireless Networks}, journal={Elsevier Computer Networks}, volume ={51}, number={15}, pages={4303--4321}, year={2007}, author={W. Wang and T. Stransky} } @article{Wang-Inter-07, title={Interactive Wormhole Detection and Evaluation}, journal={Information Visualization Journal (IVS)}, volume={6}, number={1}, pages={3--17}, year={2007}, author={W. Wang and A. Lu} } @article{Evans-Wireless-06, title={Wireless networking security: open issues in trust, management, interoperation, and measurement}, journal={International Journal of Security and Networks (IJSN)}, volume={1}, number={1/2}, pages={84--94}, year={2006}, author={J. Evans and W. Wang and B. Ewy} } @article{Lu-Trust-06, title={Trust-Based Privacy Preservation for Peer-to-peer Data Sharing}, journal={IEEE Transactions on Systems, Man and Cybernetics (Part A, Systems and Humans)}, volume={36}, number={3}, pages={498--502}, year={2006}, author={Y. Lu and W. Wang and D. Xu and B. Bhargava} } @article{Wang-Defend-06, title={Defending against Wormhole Attacks in Mobile Ad Hoc Networks}, journal={Wireless Communications and Mobile Computing (WCMC)}, volume={6}, number={4}, pages={483--503}, year={2006}, author={W. Wang and B. Bhargava and Y. Lu and X. Wu} } @article{Bhargava-Inte-04, title={Integrating Heterogeneous Wireless Technologies: A Cellular-assisted Mobile Ad Hoc Network}, journal={Kluwer Mobile Networks and Applications (MONET), Special Issue on Integration of Heterogeneous Wireless Technologies}, volume={9}, pages={393--408}, year={2004}, author={B. Bhargava and X. Wu and Y. Lu and W. Wang} } @article{Lu-Secure-03, title={Secure Wireless Network with Movable Base Stations}, journal={IEICE Transactions on Communications, IEICE/IEEE Joint Special Issue on Assurance Systems and Networks}, volume={E86-B}, number={10}, pages={2922--2930}, year={2003}, author={Y. Lu and B. Bhargava and W. Wang and Y. Zhong and X. Wu} } |