Honglong Chen 陈鸿龙
Honglong Chen 陈鸿龙
Associate Professor, Ph.D supervisor at College of Control Science and Engineering, China
Verified email at upc.edu.cn - Homepage
Title
Cited by
Cited by
Year
On Protecting End-to-End Location Privacy against Local Eavesdropper in Wireless Sensor Networks
H Chen, W Lou
Elsevier Pervasive and Mobile Computing, 2015
732015
Privacy-preserving crowd-sourced statistical data publishing with an untrusted server
Z Wang, X Pang, Y Chen, H Shao, Q Wang, L Wu, H Chen, H Qi
IEEE Transactions on Mobile Computing, 2018
592018
Achieving Location Error Tolerant Barrier Coverage for Wireless Sensor Networks
Z Wang, H Chen, Q Cao, H Qi, Z Wang, Q Wang.
Computer Networks, 2016
592016
A novel mobility management scheme for target tracking in cluster-based sensor networks
Z Wang, W Lou, Z Wang, J Ma, H Chen
International Conference on Distributed Computing in Sensor Systems, 172-186, 2010
592010
From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks
H Chen, W Lou
International Performance Computing and Communications Conference, 1-8, 2010
582010
A secure localization approach against wormhole attacks using distance consistency
H Chen, W Lou, X Sun, Z Wang
EURASIP Journal on Wireless Communications and Networking 2010 (1), 1, 2010
532010
Cost-Effective Barrier Coverage Formation in Heterogeneous Wireless Sensor Networks
Z Wang, Q Cao, H Qi, H Chen, Q Wang
Ad Hoc Networks, 2017
522017
Securing DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks
H Chen, W Lou, J Wu, Z Wang, A Xia
Elsevier Pervasive and Mobile Computing, 2015
512015
A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks
Z Wang, W Lou, Z Wang, J Ma, H Chen
International Journal of Distributed Sensor Networks 2013, 2013
492013
Label-based DV-Hop localization against wormhole attacks in wireless sensor networks
J Wu, H Chen, W Lou, Z Wang, Z Wang
2010 IEEE Fifth International Conference on Networking, Architecture, and …, 2010
472010
Conflicting-set-based wormhole attack resistant localization in wireless sensor networks
H Chen, W Lou, Z Wang
International Conference on Ubiquitous Intelligence and Computing, 296-309, 2009
422009
Fault Tolerant Barrier Coverage for Wireless Sensor Networks
Z Wang, H Chen, Q Cao, H Qi, Z Wang
IEEE International Conference on Computer Communications (IEEE INFOCOM 2014), 2014
412014
Contact expectation based routing for delay tolerant networks
H Chen, W Lou
Ad Hoc Networks 36, 244-257, 2016
402016
GAR: Group Aware Cooperative Routing Protocol for Resource- Constraint Opportunistic Networks
H Chen, W Lou
Elsevier Computer Communications, 2014
402014
Narrowband Internet of Things systems with opportunistic D2D communication
Y Li, K Chi, H Chen, Z Wang, Y Zhu
IEEE Internet of Things Journal 5 (3), 1474-1484, 2017
352017
Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems with Unknown Tags
H Chen, G Xue, Z Wang
IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2017.2664810, 2017
322017
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs
H Chen, W Lou, Z Wang, Q Wang
IEEE Transactions on Vehicular Technology 65 (8), 6377-6388, 2016
262016
A social-based watchdog system to detect selfish nodes in opportunistic mobile networks
B Jedari, F Xia, H Chen, SK Das, A Tolba, ALM Zafer
Future Generation Computer Systems 92, 777-788, 2019
252019
TSCD: a novel secure localization approach for wireless sensor networks
H Chen, W Lou, J Ma, Z Wang
2008 Second international conference on sensor technologies and applications …, 2008
232008
Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems
H Chen, Z Wang, F Xia, Y Li, L Shi
IEEE Internet of Things Journal, 2017
222017
The system can't perform the operation now. Try again later.
Articles 1–20