Follow
Wei Zhao
Wei Zhao
Shenzhen University of Advanced Technology
Verified email at siat.ac.cn
Title
Cited by
Cited by
Year
A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications
J Lin, W Yu, N Zhang, X Yang, H Zhang, W Zhao
IEEE Internet of Things Journal 4 (5), 1125-1142, 2017
32802017
Mobile communications handbook
JD Gibson
CRC press, 2012
12212012
Algorithms for scheduling imprecise computations
JWS Liu, KJ Lin, WK Shih, AC Yu, JY Chung, W Zhao
Foundations of Real-Time Computing: Scheduling and Resource Management, 203-249, 1991
8371991
Distributed scheduling of tasks with deadlines and resource requirements
K Ramamritham, JA Stankovic, W Zhao
IEEE Transactions on Computers 38 (8), 1110-1123, 1989
5241989
On false data-injection attacks against power system state estimation: Modeling and countermeasures
Q Yang, J Yang, W Yu, D An, N Zhang, W Zhao
IEEE Transactions on Parallel and Distributed Systems 25 (3), 717-729, 2013
4742013
A Survey on Big Data Market: Pricing, Trading and Protection
F Liang, W Yu, D An, Q Yang, X Fu, W Zhao
IEEE Access 6, 15132-15154, 2018
3842018
Preemptive scheduling under time and resource constraints
W Zhao, K Ramamritham, JA Stankovic
IEEE Transactions on computers 100 (8), 949-960, 1987
3791987
Scheduling tasks with resource requirements in hard real-time systems
W Zhao, K Ramamritham, JA Stankovic
IEEE transactions on software engineering, 564-577, 1987
3701987
DSSS-based flow marking technique for invisible traceback
W Yu, X Fu, S Graham, D Xuan, W Zhao
2007 IEEE Symposium on Security and Privacy (SP'07), 18-32, 2007
2662007
Migration modeling and learning algorithms for containers in fog computing
Z Tang, X Zhou, F Zhang, W Jia, W Zhao
IEEE Transactions on Services Computing 12 (5), 712-725, 2018
2482018
On flow correlation attacks and countermeasures in mix networks
Y Zhu, X Fu, B Graham, R Bettati, W Zhao
International Workshop on Privacy Enhancing Technologies, 207-225, 2004
2462004
Guaranteeing synchronous message deadlines with the timed token medium access control protocol
G Agrawal, B Chen, W Zhao, S Davari
IEEE transactions on Computers 43 (3), 327-339, 1994
2241994
Protection of query privacy for continuous location based services
A Pingley, N Zhang, X Fu, HA Choi, S Subramaniam, W Zhao
2011 Proceedings IEEE INFOCOM, 1710-1718, 2011
2052011
Hard real-time communication in multiple-access networks
N Malcolm, W Zhao
Real-Time Systems 8 (1), 35-77, 1995
2051995
Virtual time CSMA protocols for hard real-time communication
W Zhao, K Ramamritham
IEEE Transactions on Software Engineering, 938-952, 1987
2001987
On false data injection attacks against distributed energy routing in smart grid
J Lin, W Yu, X Yang, G Xu, W Zhao
2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 183-192, 2012
1982012
The timed-token protocol for real-time communications
N Malcolm, W Zhao
Computer 27 (1), 35-41, 1994
1941994
Guaranteeing synchronous message deadlines with the timed token protocol
G Agrawal, B Chen, W Zhao, S Davari
[1992] Proceedings of the 12th International Conference on Distributed …, 1992
1821992
On optimal PMU placement-based defense against data integrity attacks in smart grid
Q Yang, D An, R Min, W Yu, X Yang, W Zhao
IEEE Transactions on Information Forensics and Security 12 (7), 1735-1750, 2017
1692017
On real-time transactions
JA Stankovic, W Zhao
ACM Sigmod Record 17 (1), 4-18, 1988
1691988
The system can't perform the operation now. Try again later.
Articles 1–20