Follow
Honglong Chen 陈鸿龙
Title
Cited by
Cited by
Year
Privacy-preserving crowd-sourced statistical data publishing with an untrusted server
Z Wang, X Pang, Y Chen, H Shao, Q Wang, L Wu, H Chen, H Qi
IEEE Transactions on Mobile Computing, 2018
1362018
On Protecting End-to-End Location Privacy against Local Eavesdropper in Wireless Sensor Networks
H Chen, W Lou
Elsevier Pervasive and Mobile Computing, 2015
1032015
Narrowband Internet of Things systems with opportunistic D2D communication
Y Li, K Chi, H Chen, Z Wang, Y Zhu
IEEE Internet of Things Journal 5 (3), 1474-1484, 2017
772017
Achieving Location Error Tolerant Barrier Coverage for Wireless Sensor Networks
Z Wang, H Chen, Q Cao, H Qi, Z Wang, Q Wang.
Computer Networks, 2016
772016
Securing DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
H Chen, W Lou, J Wu, Z Wang, A Xia
Elsevier Pervasive and Mobile Computing, 2015
762015
OPAT: Optimized Allocation of Time Dependent Tasks for Mobile Crowdsensing
Y Huang, H Chen*, G Ma, K Lin, Z Ni, N Yan, Z Wang
IEEE Transactions on Industrial Informatics, 2022
722022
From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks
H Chen, W Lou
International Performance Computing and Communications Conference, 1-8, 2010
712010
A novel mobility management scheme for target tracking in cluster-based sensor networks
Z Wang, W Lou, Z Wang, J Ma, H Chen
Distributed Computing in Sensor Systems: 6th IEEE International Conference …, 2010
682010
Cost-Effective Barrier Coverage Formation in Heterogeneous Wireless Sensor Networks
Z Wang, Q Cao, H Qi, H Chen, Q Wang
Ad Hoc Networks, 2017
662017
A social-based watchdog system to detect selfish nodes in opportunistic mobile networks
B Jedari, F Xia, H Chen, SK Das, A Tolba, ALM Zafer
Future Generation Computer Systems 92, 777-788, 2019
572019
CRPD: a novel clustering routing protocol for dynamic wireless sensor networks
S Wang, J Yu, M Atiquzzaman, H Chen, L Ni
Personal and Ubiquitous Computing 22, 545-559, 2018
572018
Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems with Unknown Tags
H Chen, G Xue, Z Wang
IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2017.2664810, 2017
572017
When mobile crowdsensing meets privacy
Z Wang, X Pang, J Hu, W Liu, Q Wang, Y Li, H Chen
IEEE Communications Magazine 57 (9), 72-78, 2019
562019
A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks
Z Wang, W Lou, Z Wang, J Ma, H Chen
International Journal of Distributed Sensor Networks 2013, 2013
562013
Contact expectation based routing for delay tolerant networks
H Chen, W Lou
Ad Hoc Networks 36, 244-257, 2016
542016
A secure localization approach against wormhole attacks using distance consistency
H Chen, W Lou, X Sun, Z Wang
EURASIP Journal on Wireless Communications and Networking 2010 (1), 1, 2010
532010
Label-based DV-Hop localization against wormhole attacks in wireless sensor networks
J Wu, H Chen, W Lou, Z Wang, Z Wang
2010 IEEE Fifth International Conference on Networking, Architecture, and …, 2010
512010
Dynamic distributed honeypot based on blockchain
L Shi, Y Li, T Liu, J Liu, B Shan, H Chen
IEEE Access 7, 72234-72246, 2019
462019
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems
X Ai, H Chen*, K Lin, Z Wang, J Yu
IEEE Transactions on Information Forensics and Security, 2021
452021
Pay on-demand: Dynamic incentive and task selection for location-dependent mobile crowdsensing systems
Z Wang, J Hu, J Zhao, D Yang, H Chen, Q Wang
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
452018
The system can't perform the operation now. Try again later.
Articles 1–20