Follow
Liran Ma
Title
Cited by
Cited by
Year
3D underwater sensor network localization
AY Teymorian, W Cheng, L Ma, X Cheng, X Lu, Z Lu
IEEE Transactions on Mobile Computing 8 (12), 2009
2522009
Underwater localization in sparse 3D acoustic sensor networks
W Cheng, AY Teymorian, L Ma, X Cheng, X Lu, Z Lu
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 236-240, 2008
2342008
Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networks
K Xing, X Cheng, L Ma, Q Liang
Proceedings of the 13th annual ACM international conference on Mobile …, 2007
1612007
Jamming strategies for physical layer security
Y Huo, Y Tian, L Ma, X Cheng, T Jing
IEEE Wireless Communications 25 (1), 148-153, 2017
1202017
A hybrid rogue access point protection framework for commodity Wi-Fi networks
L Ma, AY Teymorian, X Cheng
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1220-1228, 2008
1202008
Architecture and performance of SIGMA: A seamless mobility architecture for data networks
S Fu, L Ma, M Atiquzzaman, YJ Lee
IEEE International Conference on Communications, 2005. ICC 2005. 2005 5 …, 2005
1162005
Rogue access point detection by analyzing network traffic characteristics
S Shetty, M Song, L Ma
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
942007
Signaling cost and performance of SIGMA: A seamless handover scheme for data networks
S Fu, M Atiquzzaman, L Ma, YJ Lee
Wireless Communications and Mobile Computing 5 (7), 825-845, 2005
932005
On Connected Target k-Coverage in Heterogeneous Wireless Sensor Networks
J Yu, Y Chen, L Ma, B Huang, X Cheng
Sensors 16 (1), 104, 2016
672016
Secure communications in tiered 5G wireless networks with cooperative jamming
Y Huo, X Fan, L Ma, X Cheng, Z Tian, D Chen
IEEE Transactions on Wireless Communications 18 (6), 3265-3280, 2019
612019
A time fairness-based MAC algorithm for throughput maximization in 802.11 networks
Y Le, L Ma, W Cheng, X Cheng, B Chen
IEEE Transactions on Computers 64 (1), 19-31, 2013
522013
SBK: A self-configuring framework for bootstrapping keys in sensor networks
F Liu, X Cheng, L Ma, K Xing
IEEE Transactions on Mobile Computing 7 (7), 858-868, 2008
502008
A context-aware multiarmed bandit incentive mechanism for mobile crowd sensing systems
Y Wu, F Li, L Ma, Y Xie, T Li, Y Wang
IEEE Internet of Things Journal 6 (5), 7648-7658, 2019
492019
A scheme for trustworthy friendly jammer selection in cooperative cognitive radio networks
Y Wen, Y Huo, L Ma, T Jing, Q Gao
IEEE Transactions on Vehicular Technology 68 (4), 3500-3512, 2019
392019
iPAK: an in-situ pairwise key bootstrapping scheme for wireless sensor networks
L Ma, X Cheng, F Liu, F An, J Rivera
IEEE Transactions on Parallel and Distributed Systems 18 (8), 1174-1184, 2007
352007
RAP: Protecting commodity wi-fi networks from rogue access points
L Ma, AY Teymorian, X Cheng, M Song
The fourth international conference on heterogeneous networking for quality …, 2007
342007
An enhanced low overhead and stable clustering scheme for crossroads in VANETs
Y Huo, Y Liu, L Ma, X Cheng, T Jing
EURASIP Journal on Wireless Communications and Networking 2016, 1-13, 2016
332016
Worst-case cooperative jamming for secure communications in CIoT networks
Z Li, T Jing, L Ma, Y Huo, J Qian
Sensors 16 (3), 339, 2016
292016
Interference aware metric for dense multi-hop wireless networks
L Ma, Q Zhang, Y Xiong, W Zhu
IEEE International Conference on Communications, 2005. ICC 2005. 2005 2 …, 2005
292005
Diar: A dynamic interference aware routing protocol for ieee 802.11-based mobile ad hoc networks
L Ma, Q Zhang, F An, X Cheng
Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005 …, 2005
282005
The system can't perform the operation now. Try again later.
Articles 1–20